Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107590
B. Klimova, P. Poulova, Ondřej Sucharda
The term itself has its origin in the English language. Originally, it meant a community. It was a group of people who interacted with one another. Today this term is mainly connected with the Internet. Likewise the Internet, social networks penetrate all the spheres of human life and they are becoming a phenomenon of modern times. People use them not only for entertainment but also as a means of their business and educational tool. The purpose of this article is to discuss four foreign social networks and one Czech social network with a focus on their potential for educational purposes. In addition, the authors of this article present the results of a focus interview survey which explores some of the issues connected with the use of social networks in education.
{"title":"Social networks and their use in education","authors":"B. Klimova, P. Poulova, Ondřej Sucharda","doi":"10.1109/ICETA.2014.7107590","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107590","url":null,"abstract":"The term itself has its origin in the English language. Originally, it meant a community. It was a group of people who interacted with one another. Today this term is mainly connected with the Internet. Likewise the Internet, social networks penetrate all the spheres of human life and they are becoming a phenomenon of modern times. People use them not only for entertainment but also as a means of their business and educational tool. The purpose of this article is to discuss four foreign social networks and one Czech social network with a focus on their potential for educational purposes. In addition, the authors of this article present the results of a focus interview survey which explores some of the issues connected with the use of social networks in education.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107614
J. Papán, P. Segec, P. Paluch
After a network node or a link fails, an unpredictable period of time ensues during which the network communication is disturbed. This period encompasses the time necessary for the network to reconverge on new shortest paths. This process may last from a few miliseconds up to tens of seconds. The time heavily depends on the physical topology and the routing protocol used. During the failure and reconvergence period, the network is experiencing serious connectivity issues in which different destinations may become unreachable causing other difficulties, e.g. with critical and sensitive services. Addressing these issues, IP Fast ReRoute (IP FRR) mechanisms have been developed. The main goal of IPFRR mechanisms is to minimize network recovery time by computing repair paths for possible node or link failures before they happen. Several IPFR mechanisms exist, ranging from selecting loop-free alternatives to other ones using tunneling mechanisms. In this paper we are proposing a new multicast based mechanism for IPFRR recovery in an IPv6 network. Our proposed mechanism uses a modified algorithm of the Reverse Path Forwarding (RPF) control used by Protocol Independent Multicast - Dense Mode (PIM-DM) multicast routing.
{"title":"Utilization of PIM-DM in IP fast reroute","authors":"J. Papán, P. Segec, P. Paluch","doi":"10.1109/ICETA.2014.7107614","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107614","url":null,"abstract":"After a network node or a link fails, an unpredictable period of time ensues during which the network communication is disturbed. This period encompasses the time necessary for the network to reconverge on new shortest paths. This process may last from a few miliseconds up to tens of seconds. The time heavily depends on the physical topology and the routing protocol used. During the failure and reconvergence period, the network is experiencing serious connectivity issues in which different destinations may become unreachable causing other difficulties, e.g. with critical and sensitive services. Addressing these issues, IP Fast ReRoute (IP FRR) mechanisms have been developed. The main goal of IPFRR mechanisms is to minimize network recovery time by computing repair paths for possible node or link failures before they happen. Several IPFR mechanisms exist, ranging from selecting loop-free alternatives to other ones using tunneling mechanisms. In this paper we are proposing a new multicast based mechanism for IPFRR recovery in an IPv6 network. Our proposed mechanism uses a modified algorithm of the Reverse Path Forwarding (RPF) control used by Protocol Independent Multicast - Dense Mode (PIM-DM) multicast routing.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"15 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120889849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107604
G. Márton, A. David
In today's fast-paced world access to the right information for the right person at the right time is critical, and it is not necessarily related to business life. The same applies to students using e-learning systems and contents. As there are seemingly never-ending news reporting different types of security vulnerabilities and exploits on a daily basis, security and privacy have become top priorities. People are forced to share confident and sensitive information through different services on the internet, while relying on the security they offer can be misleading at best. Even if strong and complex passwords are required from the users, there is no guarantee that even the underlying protocol or services do not contain any security vulnerabilities. So it is extremely important to realize that other factors must be involved during the authentication process without making it too complicated for the everyday use. In this paper the more and more popular two-factor authentication method is proposed as a reasonable and promising solution, and an example is also given how it can be implemented for e-learning systems currently available.
{"title":"Security considerations and two-factor authentication opportunities in e-learning environments","authors":"G. Márton, A. David","doi":"10.1109/ICETA.2014.7107604","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107604","url":null,"abstract":"In today's fast-paced world access to the right information for the right person at the right time is critical, and it is not necessarily related to business life. The same applies to students using e-learning systems and contents. As there are seemingly never-ending news reporting different types of security vulnerabilities and exploits on a daily basis, security and privacy have become top priorities. People are forced to share confident and sensitive information through different services on the internet, while relying on the security they offer can be misleading at best. Even if strong and complex passwords are required from the users, there is no guarantee that even the underlying protocol or services do not contain any security vulnerabilities. So it is extremely important to realize that other factors must be involved during the authentication process without making it too complicated for the everyday use. In this paper the more and more popular two-factor authentication method is proposed as a reasonable and promising solution, and an example is also given how it can be implemented for e-learning systems currently available.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107575
J. Horalek, Filip Holík, M. Macháček
This article introduces model typologies and a simulation of data flow used for teaching the problems of QoS, and verification of basic parameters before and after implementing the QoS mechanism, including their evaluation and its depiction in graphs.
{"title":"Proposal task to verify functionality of QoS","authors":"J. Horalek, Filip Holík, M. Macháček","doi":"10.1109/ICETA.2014.7107575","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107575","url":null,"abstract":"This article introduces model typologies and a simulation of data flow used for teaching the problems of QoS, and verification of basic parameters before and after implementing the QoS mechanism, including their evaluation and its depiction in graphs.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115422345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107547
M. Binas
The main objective of this article is to verify the assumption, if the web services can be used in the process of automatic assessment of programming assignments. It tries to identify general services for such processes and presents the experimental part by creating platform based on set of web services.
{"title":"Identifying web services for automatic assessments of programming assignments","authors":"M. Binas","doi":"10.1109/ICETA.2014.7107547","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107547","url":null,"abstract":"The main objective of this article is to verify the assumption, if the web services can be used in the process of automatic assessment of programming assignments. It tries to identify general services for such processes and presents the experimental part by creating platform based on set of web services.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127356476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107588
O. Kainz, M. Kovalcik, R. Vápeník, F. Jakab, D. Cymbalák
In this paper are presented the approaches and measures taken in order to enhance the learning process of computer networks. During research described in this paper we take into the consideration primarily traditional form of education, i.e. active presence of student at the institution. Enhancement itself lies in the elimination of system testing and its replacement with testing on the real devices. Overall experience brings promising results and improvement in the educational process.
{"title":"Approaches and measures to enhancement of computer networks courses","authors":"O. Kainz, M. Kovalcik, R. Vápeník, F. Jakab, D. Cymbalák","doi":"10.1109/ICETA.2014.7107588","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107588","url":null,"abstract":"In this paper are presented the approaches and measures taken in order to enhance the learning process of computer networks. During research described in this paper we take into the consideration primarily traditional form of education, i.e. active presence of student at the institution. Enhancement itself lies in the elimination of system testing and its replacement with testing on the real devices. Overall experience brings promising results and improvement in the educational process.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126391691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107619
P. Poulova, I. Šimonová
The paper focuses on the field of the possible use of mobile devices for education. data were collected by the questionnaire method from 203 respondents - FIM students monitoring the ownership and use of the devices for personal and education purposes. The results show the mobile devices are widely spread among the FIM students so their systematic implementation into the process of instruction cab start.
{"title":"Mobile technologies within the higher education","authors":"P. Poulova, I. Šimonová","doi":"10.1109/ICETA.2014.7107619","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107619","url":null,"abstract":"The paper focuses on the field of the possible use of mobile devices for education. data were collected by the questionnaire method from 203 respondents - FIM students monitoring the ownership and use of the devices for personal and education purposes. The results show the mobile devices are widely spread among the FIM students so their systematic implementation into the process of instruction cab start.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107605
A. Mesarosova, M. Ferrer Hernández, P. Mésároš
This paper presents Augmented Reality as a tool for educational tool used for teaching of subject like history, chemistry or ecology as well as the original Augmented Reality tool centered on education in the field of the architecture and urban planning.
{"title":"Augmented reality as an educational tool of M-learning focused on architecture and urban planning","authors":"A. Mesarosova, M. Ferrer Hernández, P. Mésároš","doi":"10.1109/ICETA.2014.7107605","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107605","url":null,"abstract":"This paper presents Augmented Reality as a tool for educational tool used for teaching of subject like history, chemistry or ecology as well as the original Augmented Reality tool centered on education in the field of the architecture and urban planning.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"2 s1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107544
J. Tej, V. A. Taha, L. Bednárová, M. Šírková
Many years have in education dominated theoretical information and knowledge transmission and relatively little (or no) attention has been paid in practical experiences, creativity and innovation. However, in current dynamically changing and by information and technologies supersaturated environment becomes creativity an important determinant of the success of organizations because of its ability to generate new/innovative ideas, products, and solutions. Educational institutions are facing a new challenge - to prepare students - the future workforce - so that they are able to adequately or creatively address the problems and challenges, think critically and unconventionally (out of the box), act quickly and efficiently. The paper summarizes existing business simulation literature and provides some authors' experiences and outputs of the research on students' attitudes to the use of business simulation in education as a “innovative” teaching method.
{"title":"Management simulation exercises — Insight into their use in the educational process","authors":"J. Tej, V. A. Taha, L. Bednárová, M. Šírková","doi":"10.1109/ICETA.2014.7107544","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107544","url":null,"abstract":"Many years have in education dominated theoretical information and knowledge transmission and relatively little (or no) attention has been paid in practical experiences, creativity and innovation. However, in current dynamically changing and by information and technologies supersaturated environment becomes creativity an important determinant of the success of organizations because of its ability to generate new/innovative ideas, products, and solutions. Educational institutions are facing a new challenge - to prepare students - the future workforce - so that they are able to adequately or creatively address the problems and challenges, think critically and unconventionally (out of the box), act quickly and efficiently. The paper summarizes existing business simulation literature and provides some authors' experiences and outputs of the research on students' attitudes to the use of business simulation in education as a “innovative” teaching method.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICETA.2014.7107603
M. Malčík, E. Mechlová, Z. Sikorová, A. Mentel
According to current researches, individual differences in eye movement patterns may be related to different ways of text processing, to comprehension difficulties, etc. They also depend on the nature of the text. Particular question is how reading takes place in case of using figurative (visual) language, e.g. in case of metaphors, irony, or fixed phrases (phraseologisms). Based on other researches, it is evident that the development level of executive functions of each individual is strongly tied to their sociocultural background, especially to the parenting style of their family; on the other hand, differences in executive function significantly affect a person's performance at school. The notable part for the aim of this paper, however, is the direct link between executive functions and eye movement, i.e. on the basis of eye tracking it is possible to make direct, unaltered conclusions on executive functions [1]. Electronic screens on laptop and tablet computers and smartphones are being used for reading text, often while multitasking [14]. The question arises whether reading from a screen is as effective as the reading from textbooks. One of the aims of the paper is to verify the visual patterns of information retrieval from screen for problem comprehension and solving using eyetracking technology.
{"title":"Analysis of visual perceptual patterns on screen using eyetracker technology","authors":"M. Malčík, E. Mechlová, Z. Sikorová, A. Mentel","doi":"10.1109/ICETA.2014.7107603","DOIUrl":"https://doi.org/10.1109/ICETA.2014.7107603","url":null,"abstract":"According to current researches, individual differences in eye movement patterns may be related to different ways of text processing, to comprehension difficulties, etc. They also depend on the nature of the text. Particular question is how reading takes place in case of using figurative (visual) language, e.g. in case of metaphors, irony, or fixed phrases (phraseologisms). Based on other researches, it is evident that the development level of executive functions of each individual is strongly tied to their sociocultural background, especially to the parenting style of their family; on the other hand, differences in executive function significantly affect a person's performance at school. The notable part for the aim of this paper, however, is the direct link between executive functions and eye movement, i.e. on the basis of eye tracking it is possible to make direct, unaltered conclusions on executive functions [1]. Electronic screens on laptop and tablet computers and smartphones are being used for reading text, often while multitasking [14]. The question arises whether reading from a screen is as effective as the reading from textbooks. One of the aims of the paper is to verify the visual patterns of information retrieval from screen for problem comprehension and solving using eyetracking technology.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130703235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}