Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572104
Michal Beno
Globalisation in higher education directly influences competition among universities. Every institution is continually motivated to improve its quality in order to survive and to achieve further success. The evolution of Internet technology has expanded word-of-mouth (WoM) communication into a form of electronic word of mouth (eWoM). eWoM has become a phenomenon that is improving the image of every organisation in our society. This study is aimed at identifying and analysing the transformation of WoM into eWoM, finding the differences between them and examining the perceived influence of electronic word of mouth on choice of university by potential students in Slovakia. The purpose of this study is to show how the eWoM method works in university choice compared with traditional WoM. Data were collected by email questionnaires from five grammar schools in the Trencin district. The results show that students are highly influenced by eWoM compared with WoM and depend on online reviews/comments posted on review/forum type websites instead of on social media when making decisions regarding choice of university. Thus, the overall image of the university significantly and positively influences the student's choice of foreign university.
{"title":"Analysis of the Influence of Electronic Word-of-Mouth on University Choice by Slovakian Grammar School Students","authors":"Michal Beno","doi":"10.1109/ICETA.2018.8572104","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572104","url":null,"abstract":"Globalisation in higher education directly influences competition among universities. Every institution is continually motivated to improve its quality in order to survive and to achieve further success. The evolution of Internet technology has expanded word-of-mouth (WoM) communication into a form of electronic word of mouth (eWoM). eWoM has become a phenomenon that is improving the image of every organisation in our society. This study is aimed at identifying and analysing the transformation of WoM into eWoM, finding the differences between them and examining the perceived influence of electronic word of mouth on choice of university by potential students in Slovakia. The purpose of this study is to show how the eWoM method works in university choice compared with traditional WoM. Data were collected by email questionnaires from five grammar schools in the Trencin district. The results show that students are highly influenced by eWoM compared with WoM and depend on online reviews/comments posted on review/forum type websites instead of on social media when making decisions regarding choice of university. Thus, the overall image of the university significantly and positively influences the student's choice of foreign university.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124666778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572198
M. Repko, J. Gamec, P. Kurdel, M. Gamcová
In our laboratory, we developed a simple estimation of the wall thickness by the UWB (Ultra Wide-Band) radar system. The described technique measures the wall thickness in the two steps. The first step is a measurement of the wall relative permittivity. The second step is a reflections localization and estimation of the wall thickness. The borders of the wall could be detected by the envelope of the received signals. The described technique calculates the signal envelope by the Hilbert transform. Moreover, the relative permittivity of the wall is estimated by the technique developed in our department as well. The effective relative permittivity is calculated from the frequency dependency of relative permittivity.
{"title":"Estimation of the Wall Thickness and Relative Permittivity by Radar System","authors":"M. Repko, J. Gamec, P. Kurdel, M. Gamcová","doi":"10.1109/ICETA.2018.8572198","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572198","url":null,"abstract":"In our laboratory, we developed a simple estimation of the wall thickness by the UWB (Ultra Wide-Band) radar system. The described technique measures the wall thickness in the two steps. The first step is a measurement of the wall relative permittivity. The second step is a reflections localization and estimation of the wall thickness. The borders of the wall could be detected by the envelope of the received signals. The described technique calculates the signal envelope by the Hilbert transform. Moreover, the relative permittivity of the wall is estimated by the technique developed in our department as well. The effective relative permittivity is calculated from the frequency dependency of relative permittivity.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572064
B. Mikula, A. Tobisová, D. Blasko, I. Vajdová, E. Jenčová, L. Melníková, S. Szabó, S. Szabó, V. Němec
Globalization brings increasing pressure on competition and, above all, continually increases the qualification requirements in every sphere of the economy. The increasing number of specific jobs in the labor market calls for a narrower professional qualification for employees. The whole process is supported by the development of information and communication technologies. Technological support of education creates a great space for distance learning in all its forms. It is important to transfer these modern training techniques to all sectors of the economy but also to the public sector. Appropriate application of distance learning would result in a more effective transfer of new information and more efficient and faster increase in the qualifications requirements for public sector employees.
{"title":"Draft of Firefighter Education Process Through Distance Learning","authors":"B. Mikula, A. Tobisová, D. Blasko, I. Vajdová, E. Jenčová, L. Melníková, S. Szabó, S. Szabó, V. Němec","doi":"10.1109/ICETA.2018.8572064","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572064","url":null,"abstract":"Globalization brings increasing pressure on competition and, above all, continually increases the qualification requirements in every sphere of the economy. The increasing number of specific jobs in the labor market calls for a narrower professional qualification for employees. The whole process is supported by the development of information and communication technologies. Technological support of education creates a great space for distance learning in all its forms. It is important to transfer these modern training techniques to all sectors of the economy but also to the public sector. Appropriate application of distance learning would result in a more effective transfer of new information and more efficient and faster increase in the qualifications requirements for public sector employees.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"12 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114126960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572262
J. Hvorecký
In public opinion, “Mathematics = Calculations”. In a more meticulous formulations, the same opinion is expressed by making it indistinguishable from abstraction, symbolic representation, and symbolic manipulation. Such opinions lower its important role in our social life and, consequently, build an inappropriate starting point for education - not only in Mathematics but in a wide range of other subjects. In this contribution, we open door for a different educational basis using arguments from Knowledge Management. The above opinions do not consider that all our knowledge requires extensive amount of tacit knowledge. In the present course, tacit knowledge is oriented “inside” i.e. to optimal execution of formal operations. Here we demonstrate how to build “external” tacit knowledge i.e. learners' comprehension of links between Mathematics and real world. To evoke their interest, non-traditional (“absurd”) problems in are used. The simple examples demonstrate Mathematics' power, limits and role in society. The paper also calls for creating similar problems in other disciplines in order to prepare STEM students for their effective participation in multidisciplinary teams.
{"title":"Scaffolding Mathematical Prerequisites to STEM Students by Solving Non-Traditional Problems","authors":"J. Hvorecký","doi":"10.1109/ICETA.2018.8572262","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572262","url":null,"abstract":"In public opinion, “Mathematics = Calculations”. In a more meticulous formulations, the same opinion is expressed by making it indistinguishable from abstraction, symbolic representation, and symbolic manipulation. Such opinions lower its important role in our social life and, consequently, build an inappropriate starting point for education - not only in Mathematics but in a wide range of other subjects. In this contribution, we open door for a different educational basis using arguments from Knowledge Management. The above opinions do not consider that all our knowledge requires extensive amount of tacit knowledge. In the present course, tacit knowledge is oriented “inside” i.e. to optimal execution of formal operations. Here we demonstrate how to build “external” tacit knowledge i.e. learners' comprehension of links between Mathematics and real world. To evoke their interest, non-traditional (“absurd”) problems in are used. The simple examples demonstrate Mathematics' power, limits and role in society. The paper also calls for creating similar problems in other disciplines in order to prepare STEM students for their effective participation in multidisciplinary teams.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133765586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572277
F. Babič, V. Gaspar, P. Šatala
In this paper, we propose a concept of teaching mobile technologies development as a specific application of the software development lifecycle. We have deployed this concept into the terms of the study program called Business Informatics at the Technical University of Kosice, in Slovakia. Students get familiar with some traditional methods of software development life cycle like waterfall and with Scrum as a representative of the Agile methodologies. We presented the obtained results and experiences from three courses creating a necessary basic for one direction of our master and bachelor's thesis. Our motivation was to cover all necessary stages like design with User Experience, development in line with current trends, testing using appropriate methods and metrics, deployment with a tracking system, monetization and appropriate licensing. From the hardware point of view, we offer different intelligent devices like wearable sensors, bracelets or watches to create various mobile applications for data analytics and visualization methods. Moreover, we invented relevant lectures with some techniques from active learning area like retrieval practice and case-based learning. During first 2 years we have tested suitability of various supporting tools like e.g. YouTrack, JIRA, Slack or Sli.do to improve the students' readiness for real IT projects by simulating working environment in the IT companies.
在本文中,我们提出了教学移动技术开发的概念,作为软件开发生命周期的具体应用。我们在斯洛伐克科希策技术大学(Technical University of Kosice)的商业信息学研究项目中运用了这一概念。学生熟悉一些传统的软件开发生命周期的方法,如瀑布和Scrum作为敏捷方法的代表。我们提出了三门课程的成果和经验,为我们的硕士和学士学位论文的一个方向创造了必要的基础。我们的动机是覆盖所有必要的阶段,如用户体验设计,符合当前趋势的开发,使用适当的方法和参数进行测试,使用跟踪系统进行部署,盈利和适当的许可。从硬件的角度来看,我们提供不同的智能设备,如可穿戴传感器,手环或手表,以创建各种移动应用程序,用于数据分析和可视化方法。此外,我们还利用主动学习领域的一些技术,如检索练习和基于案例的学习,发明了相关的讲座。在最初的两年里,我们测试了各种支持工具的适用性,例如YouTrack, JIRA, Slack或Sli。,通过模拟资讯科技公司的工作环境,提高学生对实际资讯科技项目的准备。
{"title":"New Trends in Mobile Technologies Education in Slovakia: An Empirical Study","authors":"F. Babič, V. Gaspar, P. Šatala","doi":"10.1109/ICETA.2018.8572277","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572277","url":null,"abstract":"In this paper, we propose a concept of teaching mobile technologies development as a specific application of the software development lifecycle. We have deployed this concept into the terms of the study program called Business Informatics at the Technical University of Kosice, in Slovakia. Students get familiar with some traditional methods of software development life cycle like waterfall and with Scrum as a representative of the Agile methodologies. We presented the obtained results and experiences from three courses creating a necessary basic for one direction of our master and bachelor's thesis. Our motivation was to cover all necessary stages like design with User Experience, development in line with current trends, testing using appropriate methods and metrics, deployment with a tracking system, monetization and appropriate licensing. From the hardware point of view, we offer different intelligent devices like wearable sensors, bracelets or watches to create various mobile applications for data analytics and visualization methods. Moreover, we invented relevant lectures with some techniques from active learning area like retrieval practice and case-based learning. During first 2 years we have tested suitability of various supporting tools like e.g. YouTrack, JIRA, Slack or Sli.do to improve the students' readiness for real IT projects by simulating working environment in the IT companies.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130491135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572082
Patrik Rusnak, Lukas Cajka, M. Kvassay
Reliability analysis of a system is a complex task that includes a lot of steps. Typical steps are creation of a mathematical model of the system, computation of global reliability characteristics, detection of circumstances under which a failure of the system can occur, quantification of importance of individual elements of the system, optimization of system reliability, etc. At our faculty, we have a course on reliability analysis. During the course, the students are taught how a mathematical model of a system can be created and how it can be analyzed. For this purpose, they use various mathematical apparatus, such as Boolean algebra, calculus, theory of probability and stochastic processes. During the lectures, the students are taught how these methodologies can be applied in reliability analysis, and during the practical classes, they apply this knowledge in analysis of real systems. However, real modern systems are usually composed of a lot of components, what makes their analysis impossible without a support software. Because of that, we decided to implement a software that makes laboratory classes less time consuming on routine calculations. This software has been developed in a frame of a project course at our faculty. In the current state, it allows creating various data structures for representation of the structure of a system and, based on them, compute global reliability characteristics, such as system availability and unavailability. From the existing structures, it mainly focuses on binary decision diagrams because they can be used to represent the structure of a system in an efficient way. The software allows its user to create a binary decision diagram, manipulate with its elements, export the diagram into PNG or SVG file format. Thanks to these and others, it allows students to understand work with binary decision diagrams, investigate their properties, and prepare graphical parts of a documentation for their term projects. Furthermore, the diagrams created using the software can also be used by the teachers of the course in preparation of learning materials for students of our faculty.
{"title":"Software Tool for Manipulation with Decision Diagrams Used in Reliability Analysis","authors":"Patrik Rusnak, Lukas Cajka, M. Kvassay","doi":"10.1109/ICETA.2018.8572082","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572082","url":null,"abstract":"Reliability analysis of a system is a complex task that includes a lot of steps. Typical steps are creation of a mathematical model of the system, computation of global reliability characteristics, detection of circumstances under which a failure of the system can occur, quantification of importance of individual elements of the system, optimization of system reliability, etc. At our faculty, we have a course on reliability analysis. During the course, the students are taught how a mathematical model of a system can be created and how it can be analyzed. For this purpose, they use various mathematical apparatus, such as Boolean algebra, calculus, theory of probability and stochastic processes. During the lectures, the students are taught how these methodologies can be applied in reliability analysis, and during the practical classes, they apply this knowledge in analysis of real systems. However, real modern systems are usually composed of a lot of components, what makes their analysis impossible without a support software. Because of that, we decided to implement a software that makes laboratory classes less time consuming on routine calculations. This software has been developed in a frame of a project course at our faculty. In the current state, it allows creating various data structures for representation of the structure of a system and, based on them, compute global reliability characteristics, such as system availability and unavailability. From the existing structures, it mainly focuses on binary decision diagrams because they can be used to represent the structure of a system in an efficient way. The software allows its user to create a binary decision diagram, manipulate with its elements, export the diagram into PNG or SVG file format. Thanks to these and others, it allows students to understand work with binary decision diagrams, investigate their properties, and prepare graphical parts of a documentation for their term projects. Furthermore, the diagrams created using the software can also be used by the teachers of the course in preparation of learning materials for students of our faculty.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572191
P. Mésároš, J. Smetankova, A. Behúnová, J. Talian
Civil engineering industry is an industry that uses digital modeling tools to increase efficiency. One of the main tools for supporting automation in civil engineering industry is Building Information Modeling (BIM). BIM is an intelligent 3D model-based process that gives engineering professionals the tools to more efficiently design. One of the ways for increasing productivity and effectiveness in model creation is to create standards called BIM objects. BIM Objects are digital descriptions of products and materials. The paper is focused on the overview of the Building Information Modeling Libraries. BIM Library represents central database of BIM Objects. All the library's components are created in accordance to relevant regulations and standards.
{"title":"An Overview of Building Information Modeling Libraries","authors":"P. Mésároš, J. Smetankova, A. Behúnová, J. Talian","doi":"10.1109/ICETA.2018.8572191","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572191","url":null,"abstract":"Civil engineering industry is an industry that uses digital modeling tools to increase efficiency. One of the main tools for supporting automation in civil engineering industry is Building Information Modeling (BIM). BIM is an intelligent 3D model-based process that gives engineering professionals the tools to more efficiently design. One of the ways for increasing productivity and effectiveness in model creation is to create standards called BIM objects. BIM Objects are digital descriptions of products and materials. The paper is focused on the overview of the Building Information Modeling Libraries. BIM Library represents central database of BIM Objects. All the library's components are created in accordance to relevant regulations and standards.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572275
M. Švecová, D. Kocur, M. Švingál
Monitoring of people by using ultra-wideband (UWB) radars is becoming more and more attractive for many practical applications. This trend follows from the ability of this technology to detect and localize living people even in the case of low or zero-optical visibility. Because of the attractiveness and perspective of this technology, education focused on UWB sensors and their applications has been included also to M.Sc. program in the branch of electronics provided at Technical University of Kosice (TUKE). In order to support this education process, a MATLAB application denoted as UWB-PerLoc-MAT has been designed. UWB-PerLoc-MAT allows UWB radar signal processing for person localization and tracking in 2D space and hence, it can be applied with the advantage during experimental exercises intent on person localization. UWB-PerLoc-MAT has many useful features and useful properties. We believe that it could be interesting for readers working in the field of UWB sensor technologies and related education. Therefore we have decided to bring readers interested in this issue, basic information about UWB-PerLoc-MAT through this paper.
{"title":"UWB-PerLoc-MAT: MATLAB App for Person Localization by UWB Sensor","authors":"M. Švecová, D. Kocur, M. Švingál","doi":"10.1109/ICETA.2018.8572275","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572275","url":null,"abstract":"Monitoring of people by using ultra-wideband (UWB) radars is becoming more and more attractive for many practical applications. This trend follows from the ability of this technology to detect and localize living people even in the case of low or zero-optical visibility. Because of the attractiveness and perspective of this technology, education focused on UWB sensors and their applications has been included also to M.Sc. program in the branch of electronics provided at Technical University of Kosice (TUKE). In order to support this education process, a MATLAB application denoted as UWB-PerLoc-MAT has been designed. UWB-PerLoc-MAT allows UWB radar signal processing for person localization and tracking in 2D space and hence, it can be applied with the advantage during experimental exercises intent on person localization. UWB-PerLoc-MAT has many useful features and useful properties. We believe that it could be interesting for readers working in the field of UWB sensor technologies and related education. Therefore we have decided to bring readers interested in this issue, basic information about UWB-PerLoc-MAT through this paper.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133686794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572201
J. Uramová, Pavel Scgeč, M. Moravčík, J. Papán, M. Kontšek, Jakub Hrabovsky
This article describes the proposal of a system that was designed for effective network monitoring, analysis of network infiltration, and archiving of network flows for their later research. The article contains the design of an appropriate infrastructure for such a system under the conditions of the Department of Information Networks. The objective was to develop a methodology for creating a custom dataset that would contain normal network traffic and traffic with various types of attacks. Dataset can be used to test network attack detection methods that the research team is working on at the Department of Information Networks. We started with detailed analysis of the available datasets, which is an important source of information for creating a custom dataset, and to identify the imperfections of these datasets, and requirements, that a trusted dataset should meet. The article describes the course of implementation, testing and optimization of one of the possible solutions of such a system. The final part of the article informs about designing the appropriate infrastructure, and using the system for dataset creation. Articel describes also tools which were used to perform DoS, DDoS attacks and botnet architecture. The article follows the work presented in [1].
{"title":"Infrastructure for Generating New IDS Dataset","authors":"J. Uramová, Pavel Scgeč, M. Moravčík, J. Papán, M. Kontšek, Jakub Hrabovsky","doi":"10.1109/ICETA.2018.8572201","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572201","url":null,"abstract":"This article describes the proposal of a system that was designed for effective network monitoring, analysis of network infiltration, and archiving of network flows for their later research. The article contains the design of an appropriate infrastructure for such a system under the conditions of the Department of Information Networks. The objective was to develop a methodology for creating a custom dataset that would contain normal network traffic and traffic with various types of attacks. Dataset can be used to test network attack detection methods that the research team is working on at the Department of Information Networks. We started with detailed analysis of the available datasets, which is an important source of information for creating a custom dataset, and to identify the imperfections of these datasets, and requirements, that a trusted dataset should meet. The article describes the course of implementation, testing and optimization of one of the possible solutions of such a system. The final part of the article informs about designing the appropriate infrastructure, and using the system for dataset creation. Articel describes also tools which were used to perform DoS, DDoS attacks and botnet architecture. The article follows the work presented in [1].","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICETA.2018.8572263
D. Suníková, Z. Kubincová, M. Byrtus
Data structures and algorithms represent an important area of computer science. Sometimes, however, they are too abstract for students to understand them only from the lecture. Therefore we were looking for a way how to explain at least some of them to students. In recent years, the use of digital games at all levels of education has come to the focus of researchers and educators. The advantage of this approach is, among others, learning in a natural and interesting way. Since there are still very few good-quality educational games, we have decided to design, implement and test our own mobile game for teaching the algorithm of inserting new nodes to an AVL tree. In this paper, we describe designing of the game as a learning tool and introduce the first results from testing the game in a university course.
{"title":"A Mobile Game to Teach AVL Trees","authors":"D. Suníková, Z. Kubincová, M. Byrtus","doi":"10.1109/ICETA.2018.8572263","DOIUrl":"https://doi.org/10.1109/ICETA.2018.8572263","url":null,"abstract":"Data structures and algorithms represent an important area of computer science. Sometimes, however, they are too abstract for students to understand them only from the lecture. Therefore we were looking for a way how to explain at least some of them to students. In recent years, the use of digital games at all levels of education has come to the focus of researchers and educators. The advantage of this approach is, among others, learning in a natural and interesting way. Since there are still very few good-quality educational games, we have decided to design, implement and test our own mobile game for teaching the algorithm of inserting new nodes to an AVL tree. In this paper, we describe designing of the game as a learning tool and introduce the first results from testing the game in a university course.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}