Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379174
L. Lipárová, R. Pondelíková, P. Voštinár
The paper deals with using the electronic environment of LMS Moodle for supporting the art education in the preparation of the future teachers of art and pre-primary and primary level. During our research, we tried to find a qualitative way how to use the cyberspace of electronic course - to create a kind of virtual “atelier” where students expose their realizations, experiences, opinions and attitudes.
{"title":"E-learning course as a space of a “virtual atelier” in art education","authors":"L. Lipárová, R. Pondelíková, P. Voštinár","doi":"10.1109/ICETA51985.2020.9379174","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379174","url":null,"abstract":"The paper deals with using the electronic environment of LMS Moodle for supporting the art education in the preparation of the future teachers of art and pre-primary and primary level. During our research, we tried to find a qualitative way how to use the cyberspace of electronic course - to create a kind of virtual “atelier” where students expose their realizations, experiences, opinions and attitudes.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124387871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379235
L. Pomšár, E. Kajati, I. Zolotová
While digitalization of the education sector has been going for years, most monotonous administrative tasks are still being performed manually. One of those tasks is class attendance tracking. On all levels of the Slovak educational system, teachers still spend several minutes trying to figure out who is absent from the class. This, mostly manual work, can be easily automatized with the help of the modern technology. We present an edge-based deep-learning powered class attendance system based on the Dlib machine learning framework and NVIDIA Jetson Nano platform to tackle this problem.
{"title":"Deep Learning Powered Class Attendance System Based on Edge Computing","authors":"L. Pomšár, E. Kajati, I. Zolotová","doi":"10.1109/ICETA51985.2020.9379235","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379235","url":null,"abstract":"While digitalization of the education sector has been going for years, most monotonous administrative tasks are still being performed manually. One of those tasks is class attendance tracking. On all levels of the Slovak educational system, teachers still spend several minutes trying to figure out who is absent from the class. This, mostly manual work, can be easily automatized with the help of the modern technology. We present an edge-based deep-learning powered class attendance system based on the Dlib machine learning framework and NVIDIA Jetson Nano platform to tackle this problem.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379260
M. Chovanec, Martin Havrilla, E. Chovancová
The work deals with the analysis of logs and audit records from email services. The growing trend of using email services as well as other electronic communication creates the need and emphasis on ensuring the reliability of these services. In the presented proposal, the work uses modern methods of log analysis and then interprets them into a visual form, uses knowledge from non-relational databases, methods of analysis and processing of audit records and uses a number of tools that participate in creating outputs. Among non-relational databases such as ElasticSearch, Apache Kafka, Redis, Splunk and MongoDB, the work selects the most suitable database for its purposes. It also discusses methods of data collection as well as their subsequent analysis and visualization. The work also uses the tools of third parties or protocols covering the collection and creation of outputs from audit logs, such as NXlog or Syslog-NG. Finally, the work focuses on the evaluation of possible safety as well as functional risks.
{"title":"Analysis of Logs in the Environment of Email Services","authors":"M. Chovanec, Martin Havrilla, E. Chovancová","doi":"10.1109/ICETA51985.2020.9379260","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379260","url":null,"abstract":"The work deals with the analysis of logs and audit records from email services. The growing trend of using email services as well as other electronic communication creates the need and emphasis on ensuring the reliability of these services. In the presented proposal, the work uses modern methods of log analysis and then interprets them into a visual form, uses knowledge from non-relational databases, methods of analysis and processing of audit records and uses a number of tools that participate in creating outputs. Among non-relational databases such as ElasticSearch, Apache Kafka, Redis, Splunk and MongoDB, the work selects the most suitable database for its purposes. It also discusses methods of data collection as well as their subsequent analysis and visualization. The work also uses the tools of third parties or protocols covering the collection and creation of outputs from audit logs, such as NXlog or Syslog-NG. Finally, the work focuses on the evaluation of possible safety as well as functional risks.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123775646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379271
L. Formanek, O. Karpis
At the Faculty of Management Science and Informatics, of University of Žilina an initiative was created to support the increase of interest in the study of hardware oriented programmees, such as the Computer Engineering programmee which we offer. This paper focuses at further explanation of one of the additional modules of the open-source platform Yrobot. Yrobot is a modular education robotic platform which is dedicated to support the teaching of robotics and other hardware subjects in high schools and universities. The extension module based on Bluetooth technology enables wireless work and control of Yrobot, which can be used and extended at the robotics lessons in teaching.
{"title":"Y robot extension module for educational and marketing purposes","authors":"L. Formanek, O. Karpis","doi":"10.1109/ICETA51985.2020.9379271","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379271","url":null,"abstract":"At the Faculty of Management Science and Informatics, of University of Žilina an initiative was created to support the increase of interest in the study of hardware oriented programmees, such as the Computer Engineering programmee which we offer. This paper focuses at further explanation of one of the additional modules of the open-source platform Yrobot. Yrobot is a modular education robotic platform which is dedicated to support the teaching of robotics and other hardware subjects in high schools and universities. The extension module based on Bluetooth technology enables wireless work and control of Yrobot, which can be used and extended at the robotics lessons in teaching.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379183
Szilásrd Korom, Illés Zoltán
External programmable devices getting more and more popular in programming education. Those devices are mainly robots., but not necessarily like Arduino or Raspberry Pi. In this article., we try to prove that the general-purpose external devices open a completely new possibility to improve system thinking in different levels through the programming education.
{"title":"System thinking competence and smart devices in programming education","authors":"Szilásrd Korom, Illés Zoltán","doi":"10.1109/ICETA51985.2020.9379183","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379183","url":null,"abstract":"External programmable devices getting more and more popular in programming education. Those devices are mainly robots., but not necessarily like Arduino or Raspberry Pi. In this article., we try to prove that the general-purpose external devices open a completely new possibility to improve system thinking in different levels through the programming education.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124784699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379166
R. Krnaáč, M. Cápay, Š. Koprda
The article deals with the programming of pupils in primary schools. In the long term, there is a growing lack of interest in computer science lessons and especially in programming. Is it possible to change less popular lessons so that students perceive IT and programming positively and learn easier than ever? Until now, classic hardware programming devices included Arduino or Raspberry Pi, which were often less suitable for students because of the complexity of their programming. With the introduction of the BBC micro: bit, pupils and teachers have opened up new opportunities for teaching and learning. The development environment, which can be controlled using blocks I of the microPython or Java language, is processed in several languages, which provides the students with a major relief from the need to translate text and their focus can be fully focused on programming. In short, we will introduce Arduino, Raspberry Pi and take a closer look at the BBC micro: bit, its features, sensors and capabilities, making it one of the most appropriate means to implement in education. We will focus on the results of research that have been carried out in the field of student programming abroad and in Slovakia and will evaluate the impact of the facility on the effectiveness of computer science teaching.
{"title":"Education with physical device BBC micro:bit","authors":"R. Krnaáč, M. Cápay, Š. Koprda","doi":"10.1109/ICETA51985.2020.9379166","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379166","url":null,"abstract":"The article deals with the programming of pupils in primary schools. In the long term, there is a growing lack of interest in computer science lessons and especially in programming. Is it possible to change less popular lessons so that students perceive IT and programming positively and learn easier than ever? Until now, classic hardware programming devices included Arduino or Raspberry Pi, which were often less suitable for students because of the complexity of their programming. With the introduction of the BBC micro: bit, pupils and teachers have opened up new opportunities for teaching and learning. The development environment, which can be controlled using blocks I of the microPython or Java language, is processed in several languages, which provides the students with a major relief from the need to translate text and their focus can be fully focused on programming. In short, we will introduce Arduino, Raspberry Pi and take a closer look at the BBC micro: bit, its features, sensors and capabilities, making it one of the most appropriate means to implement in education. We will focus on the results of research that have been carried out in the field of student programming abroad and in Slovakia and will evaluate the impact of the facility on the effectiveness of computer science teaching.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124639591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379194
Martin Messerschmidt, Matus Pleva
Neural networks have become a staple of today's day and age. Its data classification usage is very pronounced in biometrics. Its use can be seen notably in the fingerprint, iris, or facial recognition biometrics. However, the fact is that neural networks are intrinsic to biometrics in their authentication capabilities. This is not to say that every biometric system must employ these methods; rather that they are applicable to any biometric method. For this reason, in this paper, we will expand upon the presented biometric methods. In this paper, we will be presenting more advanced techniques such as finger vein and retina recognition; and alternative methods such as ECG and odor biometrics. We will converge on showcasing these methods as well as exhibiting their current usage in today's climate.
{"title":"Advanced Biometric Systems Utilizing Neural Networks in Identity Evaluation","authors":"Martin Messerschmidt, Matus Pleva","doi":"10.1109/ICETA51985.2020.9379194","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379194","url":null,"abstract":"Neural networks have become a staple of today's day and age. Its data classification usage is very pronounced in biometrics. Its use can be seen notably in the fingerprint, iris, or facial recognition biometrics. However, the fact is that neural networks are intrinsic to biometrics in their authentication capabilities. This is not to say that every biometric system must employ these methods; rather that they are applicable to any biometric method. For this reason, in this paper, we will expand upon the presented biometric methods. In this paper, we will be presenting more advanced techniques such as finger vein and retina recognition; and alternative methods such as ECG and odor biometrics. We will converge on showcasing these methods as well as exhibiting their current usage in today's climate.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379217
M. Drozdova, I. Bridova, J. Uramová, M. Moravčík
Cyber security is a current topic of the cyberspace, which includes Cloud Computing (CC) systems. Current use of CC and its expected development require strong security measures. The reason is the fact that data with sensitive information from several users enters the CC system and the disruption of the system or the leakage of such information is unacceptable. As how in building architecture, it is necessary to dimension the foundations, retaining walls and other parts of the building so that as a whole they form a fixed structure, in the architecture of ICT systems we must look at all components of each partial system too. Security architecture is one viewpoint of development in CC systems. Each deployment model and each CC service model in a particular implementation environment requires its own security framework. ICT standardization organizations have issued several recommendations and standards that provide principles for followed in the specific implementation of CC. The authors of the article used them in processing the Architecture description of the OpenStack private cloud in a university environment.
{"title":"Private cloud security architecture","authors":"M. Drozdova, I. Bridova, J. Uramová, M. Moravčík","doi":"10.1109/ICETA51985.2020.9379217","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379217","url":null,"abstract":"Cyber security is a current topic of the cyberspace, which includes Cloud Computing (CC) systems. Current use of CC and its expected development require strong security measures. The reason is the fact that data with sensitive information from several users enters the CC system and the disruption of the system or the leakage of such information is unacceptable. As how in building architecture, it is necessary to dimension the foundations, retaining walls and other parts of the building so that as a whole they form a fixed structure, in the architecture of ICT systems we must look at all components of each partial system too. Security architecture is one viewpoint of development in CC systems. Each deployment model and each CC service model in a particular implementation environment requires its own security framework. ICT standardization organizations have issued several recommendations and standards that provide principles for followed in the specific implementation of CC. The authors of the article used them in processing the Architecture description of the OpenStack private cloud in a university environment.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379239
M. Hudák, B. Sobota, Š. Korečko, M. Sivý
Web-based collaborative virtual reality is emerging as platform-independent technology that permits developers to produce fully immersive and interactive virtual environments accessible through web-browsers. The use of collaborative virtual environments can be helpful in situations when therapists and patients are unable to meet personally. This work introduces an extension of the LIRKIS G-CVE system with web-based interfaces for remote management of the upper limb rehabilitation process. Concerning the quality and safety of web technologies., we consider distant virtual training to be efficient for ordinary people.
{"title":"Fully Immersive Web-Based Collaborative Virtual Environment for Upper Limb Rehabilitation Purposes","authors":"M. Hudák, B. Sobota, Š. Korečko, M. Sivý","doi":"10.1109/ICETA51985.2020.9379239","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379239","url":null,"abstract":"Web-based collaborative virtual reality is emerging as platform-independent technology that permits developers to produce fully immersive and interactive virtual environments accessible through web-browsers. The use of collaborative virtual environments can be helpful in situations when therapists and patients are unable to meet personally. This work introduces an extension of the LIRKIS G-CVE system with web-based interfaces for remote management of the upper limb rehabilitation process. Concerning the quality and safety of web technologies., we consider distant virtual training to be efficient for ordinary people.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379245
Maroš Jakubec, Eva Lieskovská, R. Jarina
In the last 50 years, the task of automatic speaker recognition has undergone intense development and is still a popular topic. New ways are also being sought to implement speaker recognition tools in order to improve the educational process. These include support systems and services, such as recommendation and personalization-based content delivery, personalized speech assistant for human-computer interaction, or improved speech recognition systems based on speaker adaptation. Applications in the real environment stress upon technological issues such as dealing with acoustical environment variability, background noise, simultaneous speech or speaker's behaviour. The article provides a review of the state-of-the-art techniques for automatic speaker recognition with focus on its deployment in real and adverse acoustic conditions.
{"title":"An Overview of Automatic Speaker Recognition in Adverse Acoustic Environment","authors":"Maroš Jakubec, Eva Lieskovská, R. Jarina","doi":"10.1109/ICETA51985.2020.9379245","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379245","url":null,"abstract":"In the last 50 years, the task of automatic speaker recognition has undergone intense development and is still a popular topic. New ways are also being sought to implement speaker recognition tools in order to improve the educational process. These include support systems and services, such as recommendation and personalization-based content delivery, personalized speech assistant for human-computer interaction, or improved speech recognition systems based on speaker adaptation. Applications in the real environment stress upon technological issues such as dealing with acoustical environment variability, background noise, simultaneous speech or speaker's behaviour. The article provides a review of the state-of-the-art techniques for automatic speaker recognition with focus on its deployment in real and adverse acoustic conditions.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}