2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)最新文献

筛选
英文 中文
The current state of ICT security at Czech primary schools 捷克小学信息通信技术安全现状
J. Hubert, M. Dosedla, K. Picka
{"title":"The current state of ICT security at Czech primary schools","authors":"J. Hubert, M. Dosedla, K. Picka","doi":"10.1109/ICETA57911.2022.9974797","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974797","url":null,"abstract":"This research study deals with an overview of the findings on the state of information and communication technology (ICT) security in primary schools in the Czech Republic. Due to the constantly developing field, the ever-closer connection between ICT and education, and the number of threats from malware or network attacks, there is a need for sufficient security in schools. The research surveyed the state of security in a sample of 100 schools and analyzed its level. In this respect, the study provides innovative and previously unpublished findings.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do Neural Networks Recognize Patterns as well as Students? 神经网络能像学生一样识别模式吗?
Jaroslav Kopčan, M. Klimo, O. Škvarek
{"title":"Do Neural Networks Recognize Patterns as well as Students?","authors":"Jaroslav Kopčan, M. Klimo, O. Škvarek","doi":"10.1109/ICETA57911.2022.9974725","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974725","url":null,"abstract":"We compare the similarity of humans and one of the current convolutional deep neural network (CNN) LeNet-5 on handwritten digits (MNIST database) recognition under stricter formulated recognition tasks and image degradations caused by a generative adversarial network (GAN). First, a conditional GAN neural network was trained on the MNIST database and generator seeds with normal probability distribution were used. The images for recognition were obtained by the generator that is part of this trained GAN network. Different image degradations were obtained by scaling the length of the input random vector for the generator. Second, as a criterion for the recognition task, we asked the question: Did a person write this digit (without thinning, thickening, protrusions or interruption of the line, no additional image artefacts which a human cannot write with a smooth stroke of the pen)? Human is more robust in most cases of recognizing degraded images. This is since a person who learns to recognize images throughout his life can better comply with the decision criterion than a neural network, which has a much simpler structure than the human brain and learns to recognize only on a limited training set. On the other hand, if we focus recognition criteria on the handwriting of digits, human is more precise, and CNN generalizes the recognised digit more behind this limitation. Our similarity graphs between CNNs and humans can be further used to find the boundaries of the handwritten digits domain and to create a system for recognizing anomalous images.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114415253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing as a Cyber Security Threat 网络钓鱼作为网络安全威胁
M. Madleňák, K. Kampová
{"title":"Phishing as a Cyber Security Threat","authors":"M. Madleňák, K. Kampová","doi":"10.1109/ICETA57911.2022.9974817","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974817","url":null,"abstract":"The aim of this article is to present the threat of phishing within the issue of cyber security and education as one of the tools to reduce it. The article presents procedures for verifying the level of awareness of this threat in a group of selected employees of medical facilities. These procedures consist of a theoretical and a practical part. The theoretical part defines the basic framework of phishing attacks. It describes the basic knowledge and definitions that need to be mastered to understand the given area. The practical part consists of testing the readiness of a specific reference group of users through phishing trainings and phishing tests. The data collected from the testing was further analyzed and compared to determine the potential use of phishing training and phishing testing in organizations.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sectoral Strategy for Human Resources Development in the Information Technologies and Telecommunication Sector by 2030 到2030年信息技术和电信行业人力资源发展的部门战略
Alena Minns
{"title":"Sectoral Strategy for Human Resources Development in the Information Technologies and Telecommunication Sector by 2030","authors":"Alena Minns","doi":"10.1109/ICETA57911.2022.9974956","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974956","url":null,"abstract":"This contribution presents the main information about The Sectoral Strategy for the Development of Human Resources in the Information Technology and Telecommunications Sector by 2030 and its measures and detailed solutions that reflect the current and future needs of the sector.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital transformation of education with the support of the national project IT Academy 国家信息技术研究院项目支持下的教育数字化转型
D. Sveda, V. Hubeňáková, M. Babinčáková, M. Kireš, K. Kozelková, K. Lukáčová, A. Mišianiková, V. Ondová
{"title":"Digital transformation of education with the support of the national project IT Academy","authors":"D. Sveda, V. Hubeňáková, M. Babinčáková, M. Kireš, K. Kozelková, K. Lukáčová, A. Mišianiková, V. Ondová","doi":"10.1109/ICETA57911.2022.9974646","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974646","url":null,"abstract":"One of the IT Academy national project aims was to support the digital transformation of schools. Digital transformation is an inevitable condition for innovation of the educational system, as well as the needs of the digital society. The paper presents training and support of the newly established role - the school digital coordinator. The training and subsequent support contents were developed, and conducted, to sustain the role of digital coordinators at their schools.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aggregation and Evaluation of Communication Data of Large Telepresentation Infrastructure based on Computing Nodes on Critical Endpoints 基于关键端点计算节点的大型远程呈现基础设施通信数据聚合与评估
F. Jakab, J. Molitorisová, R. Vápeník, D. Cymbalák, J. Kováčová
{"title":"Aggregation and Evaluation of Communication Data of Large Telepresentation Infrastructure based on Computing Nodes on Critical Endpoints","authors":"F. Jakab, J. Molitorisová, R. Vápeník, D. Cymbalák, J. Kováčová","doi":"10.1109/ICETA57911.2022.9974757","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974757","url":null,"abstract":"This paper introduces an architecture of model solution for aggregation, evaluation and in the last step also visualization extended data related to videoconferences held by heterogenous environment of Slovak's National Telepresence Infrastructure (NTI). The main aim of this system is to properly process, and aggregate multiple attributes of videoconferences obtained on computing nodes located on critical endpoints and display them graphically for a straightforward overview. Different types of graphs are used to visualize basic videoconferences properties, while for overall statistics table visualization is used. Processed historical data is subsequently used to predict the upcoming number of videoconferences in near future and the number of videoconferences related to the particular organization for the modeled period.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision-Making Modeling in Educational Process Organization Under the Conditions of Crisis Situations Forecasting 危机情境预测条件下教育过程组织决策建模
O. Mulesa, I. Myronyuk, O. Kachmar, F. Jakab, O. Yatsyna
{"title":"Decision-Making Modeling in Educational Process Organization Under the Conditions of Crisis Situations Forecasting","authors":"O. Mulesa, I. Myronyuk, O. Kachmar, F. Jakab, O. Yatsyna","doi":"10.1109/ICETA57911.2022.9974909","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974909","url":null,"abstract":"The research deals with the problem of decision- making processes, related to the optimization of educational process. The case of shortening the length of academic semesters due to an increase in the weekly workload is considered. The mathematical model was built for the most effective use of existing audiences. It is possible to develop options for management decisions regarding the combined (face-to-face and distance learning with the use of electronic learning tools) as forms of education.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent road recognition system for an autonomous vehicle 用于自动驾驶汽车的智能道路识别系统
M. Długosz, Michał Brodzicki, P. Skruch, M. Szelest, D. Cieslar
{"title":"Intelligent road recognition system for an autonomous vehicle","authors":"M. Długosz, Michał Brodzicki, P. Skruch, M. Szelest, D. Cieslar","doi":"10.1109/ICETA57911.2022.9974839","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974839","url":null,"abstract":"The article described the car road detection system. This type of system, also known as green carpet or free space system, is part of an advanced driver assistance system (ADAS). The proposed system works by using the image of the camera located at the front of the car. The road detection system uses various operations on the image in appropriately selected color spaces. To improve the detection and reliability of the developed system, shadow areas are removed from the input images. The operation of the road detection system was practically tested using an experimental electric vehicle.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Therapist-patient interaction in virtual reality at the level of the upper limbs 在上肢水平的虚拟现实中,治疗师与患者的互动
B. Sobota, Š. Korečko, J. Gvuščová, M. Mattová
{"title":"Therapist-patient interaction in virtual reality at the level of the upper limbs","authors":"B. Sobota, Š. Korečko, J. Gvuščová, M. Mattová","doi":"10.1109/ICETA57911.2022.9974677","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974677","url":null,"abstract":"This paper describes upper extremity interaction system implemented in collaborative virtual reality. Main focus of the paper is to the description of the functionality of animation settings within the parameters of interaction/rehabilitation, visualization and functionalization of the system. With this system, the patient can be stimulated under the supervision of a therapist to practice some rehabilitation/training procedures. Due to the use of collaborative virtual reality, this process can be also applied in a distance form and thus it expands the therapist-patient interaction.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamification of cyber ranges in cybersecurity education 网络游戏化包括网络安全教育
Martin Jelo, P. Helebrandt
{"title":"Gamification of cyber ranges in cybersecurity education","authors":"Martin Jelo, P. Helebrandt","doi":"10.1109/ICETA57911.2022.9974714","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974714","url":null,"abstract":"There is a lack of cybersecurity experts, and this problem is getting worse with the increasing number and importance of IT systems together with rising number and sophistication of attacks. Rapid development in cybersecurity necessitates constant training and practice to keep up with the latest threats. Studying IT, and especially cybersecurity is considered difficult and there is an urgent need to encourage interest of students in this field. One promising avenue to improving the situation is gamification. Gamification has been used in education to improve enthusiasm of students, increasing their numbers, information uptake and retention. Leveraging social connections and human competitiveness can further motivate students to take part and engage in the learning activities they would otherwise not consider. Virtualized environments offer means to scale up the practical training as well as share latest teaching methods. Cyber ranges used by educational institutions often are such open platforms that provide such practical cybersecurity training. Moreover, with some thoughtful planning they can prove to be popular serious games. In this paper, we explore opportunities for hands-on cybersecurity education by using gamified scenarios in cyber range virtualized environment. We focus on cyber testing environments, what their types are, and what it includes. We place emphasis on creating basic game scenario close to real-world situations.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116452234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信