Documente Academic
Documente Profesional
Documente Cultură
Table of Contents
E- Learning
Virtual Labs and Educational Software as a Tool for more Effective Teaching
STEM Subjects
Identify Interface Design Patterns by Studying Intrinsic Designs
Education in Computational Science: Do Successful Examples Also Create
Success in Education?
Projects for Teaching Algorithmization in Primary Schools
Computer Engineering
Cluster Sampling for the Demand Side Management of Big Data
A Diagnosis and Prescription System to Automatically Diagnose Pests
Monitoring of events in SOA architecture for Real Time Financial Decision
System
Mobile Learning
A Study of Data Acquisition and Analysis for Driver's Behaviour and
Characteristics through Application of Smart Devices and Data Mining
Support and Improvement of the Educational Process in Regional Education in
Slovakia Through Tablet Classrooms
1
13
25
32
40
47
57
63
71
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
1 INTRODUCTION
Great development of information and
communication technologies bring to the
educational process also the possibility of
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
creation of information
sharing information.
According to [10] in international study
ICILS 2013 were involved 18 countries (Australia, Chile, Croatia, Czech Republic,
Denmark, Germany, Hong Kong (China),
South Korea, Lithuania, Netherlands,
Norway, Poland, Russian Federation,
Slovak Republic, Slovenia, Switzerland,
Thailand and Turkey. The research was
carried out in the eighth year of primary
school. This comparison showed that
Slovakia has significantly greater point
gains 517 points as an average 500 points
across studies ICILS. A similar level as
Slovakia has the countries - Germany,
Russian Federation, Croatia and Slovenia.
A significantly higher level than Slovakia
has - the Czech Republic, Australia,
Poland, Norway, South Korea. Lithuania
has an average of 494 points and three
countries - Chile, Thailand, Turkey has
significantly fewer points than 500 points,
what is the average of the study.
Interesting results for Slovakia provided a
study on the question on which school
subjects usually or almost every hour they
use a computer. 82 percent of the students
answered on informatics that was more
than the average of study ICILS. In
mathematics, it was 11 percent and
students in science subjects (Physics,
Chemistry, and Biology), it was 17
percent. These subjects belong to STEM
and is significant that these results are
worse for these items than the average of
study ICILS. It is therefore important to
conduct research and support activities to
increase the use of computers in STEM
subjects. For this aim we think that virtual
laboratories and educational software are
appropriate.
52 %
51 %
Preparing presentations
41 %
35 %
Elaboration of worksheets or
exercises
30 %
Elaboration of tests
27 %
14 %
Informatics
18 %
17 %
16 %
Foreign language
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
11 %
Mathematics
10 %
10 %
11 %
11 %
Tab 5. Slovak pupils use internet in out-ofschool time at least once a week for following
activities:
87 %
60 %
53 %
71 %
47 %
42 %
Search for different types of
information about the given topic
68 %
39 %
Mention links to the internet sources
67 %
63 %
29 %
59 %
24 %
21 %
14 %
84 %
76 %
71 %
Tab 6. Slovak pupils use computers for out-ofschool activities at least once a week for:
25 %
22 %
18 %
18 %
14 %
88 %
Listening to music
74 %
69 %
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
61 %
Playing games
38 %
35 %
SIMULATIONS IN
MATHEMATICS EDUCATION
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Virtual
reality offers a pleasant
representation of information, interaction
with a system that does not require
advanced
knowledge
of
computer
technology and lower costs compared to
other technology.
5 BASIC FUNCTIONS
The main objective of the educational VL
is to provide all the simulation tools,
applications and conditions that will be an
effective space where experimentation,
communication and collaboration can be
used for maintenance and exchange of
knowledge. This means that the virtual
environment to be used for laboratory,
trying to simulate the learning process
from the very beginning until its end.
Users should simulate the real process as
realistically as possible.
Traditional laboratory was a part of an
integrated training comprises using a
laboratory
considerably
predefined
experiments that simulate the essential
phenomena taken from the real situation.
Unfortunately, this system has its flaws
and demanding requirements.
Virtual laboratories appear to be more
advantageous than the actual laboratories
particularly for specific experiments. There
are tests that can be simulated on
computers only.
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Functions of measuring
equipment were clear
12
68
15
16
60
20
Instructions
to
measurements were easy
to understand
81
10
QUESTION
Yes
No
98
100
95
100
100
80
20
95
QUESTION
Yes
No
100
100
90
10
90
10
80
20
AD
AA
15
77
Setting up wavelengths
was simple
33
59
My understanding of
fiber loss is now better
Control of VL was
simple and intuitive
QUESTION
VL
increased
understanding of
LASER
my
the
19
66
72
71
34
26
10
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
100
80
20
100
85
15
7 VIRTUAL LABORATORIES IN
THE WORLD
Open University, founded in 1969, offers
distance studies and now has more than
240,000 students worldwide. Until the late
90's, the science courses provide students
with kits that include microscopes, printed
circuit boards, chemistry sets, containers or
even lasers. Students experimented at
home and then sent the unit back. But it
was expensive and not very practical.
Currently, almost all laboratory work is
available online via the university Open
Science Laboratory. Like many working
scientists, students can collect real data
from remote controlled devices - for
example, - spectrometry for the
identification of elements and isotopes, and
00:43-m telescope in Majorca in Spain.
Students can also explore realistic
simulated data from tools like a virtual
microscope with which we look at the high
resolution images instead of real samples.
Paulo Blikstein, director of Transformative
Technology Lab at Stanford University in
California, goes on with a new generation
of digital laboratory courses. One example
of using remotely controlled centralized
tools for biological laboratory - a project
developed with Ingmar Riedel-Kruse is
bioengineering at Stanford. "The idea is to
have an area of 10,000 petri dishes, each a
ISBN: 978-1-941968-38-32016 SDIWC
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
by
Distance
Simulations
Simulations are imitations of operating
systems through time, via computers.
These represent a process on the basis of a
model that is cheaper, faster, less risky and
more affordable than the real process.
Network applets
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
the learning
modeling.
activities
require
10
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Acknowledgment
References
11
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
society/document_library/pdf_06/report-rocard-onscience-education_en.pdf.
[13]
Sampson,
D.
(2010).
Instructional
Design. Course Lectures. University Piraeus 2010.
[14] Tselfes, B. (2002). Trial and error: The
workshop
on
the
teaching
of
Science. Athens:Island. Education and Training
Sector (TEK). Training material for teacher training
Issue 5: Sector PE04. CTI. Available from
electronics
address:
http://axis.teikav.edu.gr/
pake/Enotita_7_Logismika_PE04/AMAP_Anoikto
_Mathisiako_Perivallon / AMAP-Intro.pdf .
[15] http://onlinelabs.in/
[16]http://blog.scientix.eu/2015/08/20/virtuallaboratories-in-teaching-and-learning-science/
12
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
ABSTRACT
Designing an effective user interface for a new
system is challenging even for the most experienced
designer. In this study, we present a strategy to find
a user interface design pattern for various problem
domains through a systematic process. Our strategy
arises from studying and analyzing several popular
human-centered interface designs in their entirety of
evolution. We apply our technique to redesign
Walmarts online-store checkout web-forms, reduce
their complexity by almost 80 percent, and greatly
improve its performance without compromising its
functionality.
KEYWORDS
Interface design, user interface, design pattern,
digital interface.
1 INTRODUCTION
User Interface (UI) design has traditionally
been the most important factor for designing
applications from analog systems to digital
systems. An interface of a system is the primary
means for the user to interact with the system;
and it is the gateway where engineers can hide
the details and complexity of the system
infrastructure and still provide the users with
most, or all, functionalities the system is
capable of. The user interface of a system is a
great way to allow the user to abstractly see the
system as a much simpler model.
In reality, the interface designers give users a
wide range of experiences from intuitive and
productive to cumbersome and wasteful.
However, to design a successful user interface
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
15
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
16
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Advancements
in
telecommunication
technology have a great influence on how credit
trading transaction is done, which leads to
different development of interface for
debit/credit card authorization. The plastic
cards are now equipped with a magnetic strip
containing the owner information that can be
extracted easily by a magnetic card reader [as
seen in Figure 5], and this information can be
transmitted
through
the
existing
telecommunication system for processing.
Modern card readers are usually integrated with
the vendors point of sale computer system to
communicate with the card issuer for
authentication and approval of each transaction.
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
18
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
19
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
21
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Computer Interaction, Fifth Edition, AddisonWesley Publ. Co., Reading, MA, 2010
P. V. Schaik and J. Ling. The role of context in
perceptions of the aesthetics of web pages over
time. International Journal of HumanComputer
Studies, 79-89, 2009
K. Holtzblatt and H. R. Beyer. Contextual design:
The Encyclopedia of Human-Computer Interaction,
2nd Ed. Interaction Design Foundation, 2014
Rory Carroll. "Bell did not invent telephone, US
rules" The Guardian, June 17, 2002
Allison Bailes. If You Think Thermostat Setbacks
Don't Save Energy, You're Wrong!", 2012
[http://www.energyvanguard.com/blog-buildingscience-HERS-BPI/bid/50152/If-You-ThinkThermostat-Setbacks-Don-t-Save-Energy-You-reWrong.]
Emily S. Gerson. Pre-plastic credit: Charge plates,
coins,
celluloids,
(November
7,
2007).
[http://www.creditcards.com/credit-cardnews/credit-collectible-coins-charge-plate-1264.php]
J. Yan, and A. S. El Ahmad. Usability of
CAPTCHAs or usability issues in CAPTCHA
design, pp. 44-52, ACM, 2008
T. Yamamoto, T. Suzuki, and M. Nishigaki. A
proposal of four-panel cartoon CAPTCHA: The
Concept, pp. 575-578, IEEE, 2010
Hossain, M., Nguyen, K. D.andRahmanM.A.
"Labeled-Image CAPTCHA: concept of a secured
and universal useful CAPTCHA", proceedings of the
4th International UBT International Conference on
Computer Science and Communication Engineering
(IC-CSCE)- pp.102-108, 2015
N. Summers. Vicarious claims its AI software can
crack up to 90% of CAPTCHAs offered by Google,
Yahoo and PayPal, vol. 2014, no. October 25, pp.
3, 2013
http://beta.fortune.com/global500, July 20, 2016
T. S. Tullis. A system for evaluating screen
formats: Research and application. Advances in
Human-Computer Interaction, 214-286, 1998
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
24
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
ABSTRACT
This paper is dedicated to improving education in
computational science with support of examples
from practice based on links from social networks
as Twitter and LinkedIn. We have many of
successful examples, but the question is what the
benefits are for education. The aim is to contribute
to improve study results and optimal orientation of
students in the CRM (Customer Relationship
Management) with regard to practice. The existing
controversy
creates
inconsistency
between
a successful example in practice and education that
is not always successful. The method of solution
uses the multidimensional approach, and other
sources of information are realised surveys in CRM
courses. Achieved results show that examples from
practice are adequately supported with suitably
verified links to Twitter and LinkedIn. They
minimise the number of students with a negative
perception of courses. Benefit is good mirroring
dynamic changes in IT (information technology)
field and diversity of adopted solutions. The
challenge is to work with a growing group of
passive students and their influence through
examples from practice. Future work should focus
on increasing the interest of students in CRM and
their curiosity about appropriate methods.
KEYWORDS
Computational science, CRM, education, examples
of practice, information technology.
1 INTRODUCTION
Education is one of the oldest disciplines in the
world. People must learn new knowledge and
25
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
26
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Database
Technology
for
Support
Management and CRM (a CRM course). This
CRM course is dedicated to students in the
continuing segment of the Masters study
programme. The aim of the course is to teach
students the characteristics of CRM systems
and their philosophy.
Customer relationship management uses
a modular system based on needed applications.
Base data is oriented on records about business
partners and customers. In this course, students
learn the detailed explanation of a users
environment, the analysis of customer contact
with the company, the question of security and
implementation. There are also links to
knowledge
management
and
business
intelligence. Practical examples play an
important role too.
Surveys say more about a students view of this
course. These surveys ask about satisfaction
with this course, benefit from course structure,
missed topic, and other suitable links or advice
according to student preferences. The important
questions are:
Does
the
course
fulfil
your
expectations?
Is the course structure suitable?
Evaluate innovation in the course (links
to Twitter or LinkedIn).
Evaluate topic areas and their
suitability.
Do you have a recommendation about
innovations for this course?
By comparing answers in academic year
2013/2014 (with 15 students) and academic
year 2015/2016 (with 17 students), we gain
interesting information. Please see Table 1.
27
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Table 1: Student answers to questions in percentages in academic year 2013/2014 and 2015/2016.
Answers
Questions
Does the CRM
course fulfil your
expectations?
Is the course
structure suitable?
Do you have
a recommendation
about innovations
for this course?
Yes
Rather Yes
I do not know
Rather No
No
22% (50%)
11% (25%)
11% (0%)
0% (0%)
33% (50%)
56% (25%)
11% (25%)
0% (0%)
0% (0%)
0% (13%)
22% (0%)
34% (37%)
33% (37%)
11% (13%)
80
70
60
50
40
30
20
10
0
78 75
25
11
Positive
Do not
know
2013/2014
11 2015/2016
0
Negative
28
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Table 2: Achieved positives and negatives in the CRM course in 2015/2016 compared to 2013/2014.
Positives
Negatives
29
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
[2]
[3]
[4]
6 CONCLUSION
Education in computational science is
sophisticated activity that requires interaction
between all participants such as students,
teachers, firms and organisations from practice.
Information is available via the Internet; there
are many examples from practice mentioned to
achieve a better understanding of selected
topics. The global information society offers
many possibilities and unexpected connections.
In this reality, unfortunately, controversies still
exist from areas of innovation, diversity with
links to economic collapse and socio-economic
activities. Complex education is needed with all
examples from practice that describe an active
approach for the solution of required tasks.
CRM systems are also in the centre of interest.
Usually, CRM lectures offer needed study
documents and practical examples in available
software products. These study documents and
activities help to get better skills for practical
work based on practical examples and thematic
areas. Through the realised surveys, students
positively evaluate these examples with links to
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
30
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
31
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
KEYWORDS
teaching algorithm, programming at primary
schools, children's programming languages
INTRODUCTION
ALGORITHMIZATION IN
INFORMATICS IN A PRIMARY
SCHOOL
32
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
33
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Figure 1: Imagine
3.2 Scratch
Scratch is an environment that was created in
2007 originally for children six to sixteen
years old. In this program they have an
opportunity to discover, experiment and
create. It was developed in the MIT Media
34
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
3.3 Kodu
Another suitable environment for the teaching
of algorithms in elementary school is the
environment Kodu [7]. Kodu is a free
program that allows you to create games on
the computer. It uses a simple visual
programming language. It includes own
library of objects and allows the easy visual
programming without knowing any code. The
pupils present their creativity to solve
problems and at the same time they program
in a simple form.
Kodu
contains
interesting
graphical
environment and the programming in it does
not require the knowledge of programming
languages and the creator monitors his
progress in real time. The development
environment is designed for educational
purposes and uses a library of 3D models. The
code is composed of the commands for the
object. The toolbar includes the creation of
buildings, roads and surfaces. It contains a
large library of the materials. The pupils can
change the sky, lighting, camera settings,
transparency, wind and other effects in the
world. They determine how the game begins
for instance: the name of the world,
description of the world, countdown. In
addition to setting the world it is possible to
set each object separately.
The program Kodu in the operating system
Windows 8 and higher is installed using the
Windows Store. Just enter a search Kodu
Game Lab. The program supports multiple
languages. When using Windows 7, we need
35
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
36
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
37
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Conclusion
38
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
REFERENCES
[1] J. Gunaga, M. Karasov, Using ICT in
Informatics Education and Selected Subjects in
Primary
Education
for
Developing
of
PupilsAbilities, In ISSEP 2014: Local Proceedings
of the 7th International Conference on Informatics in
Schools: Situation, Evolution and Perspectives,
Istanbul: Ankara University, 2014. p. 33-41.
[2] The
state
educational
program
Online:
http://www.statpedu.sk/clanky/inovovany-statnyvzdelavaci-program
[3] J. Majherov, Innovation of Curricuka in
Informatics, In DidInfo 2015, Univerzita Mateja
Bela v Banskej Bystrici, 2015. s. 191.
[4] Programming
language
http://imagine.input.sk/
Imagine
Online:
edu
[7] Programming
language
KODU
http://www.kodugamelab.com
Online:
Online:
Acknowledgements
The article was prepared within the project KEGA
002UJS-4/2014 Interactive electronic learning
materials to support implementation of modern
technology in teaching mathematics and
informatics and by the project TA04031376
Research/development training methodology
aerospace specialists L410UVPE20. This project
39
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
KEYWORDS
big data; smart grid; data mining; power demand
side management; clustering analysis.
INTRODUCTION
and the three major power data center. In addition, they are weak in unstructured data processing and data deep mining analysis needs to
be strengthened[4][5].
We take electricity suggestion which can be applied to the demand side management as the research object, and a solution method for large
data environment is proposed: Firstly, the matrix vector is used to improve the FCM clustering to make it conform to the processing of
the data, and to get the whole power load curve
of the study area. Then according to the rules
of TOU electricity price and the whole load
curve, we use the method of mid-point selection, and give TOU electricity price which
conforms to the local electricity habits. About
the specific users daily load curve in this region, based on the above TOU electricity price,
we through the analysis give the suggestions
on the way of electricity, and the calculation
of the demand side response returns. Secondly, we propose the idea of sampling division to improve the operational efficiency of
large-scale data processing. Finally, based on
the actual data obtained by the investigation,
the performance of the two methods (the sampling method and the direct clustering method)
are compared by the example test, and the results show that the feasibility of sampling partition clustering is proved in large data environment.
2
In order to obtain the users electricity characteristics, so as to further tap the electricity value information, we consider using FCM
clustering. FCM clustering is a classical fuzzy
clustering algorithm[6], which can be used to
estimate the type of data points. Actual user
data is often power information on each time
40
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
node in a period of time, and we need the overall consideration of each time node in this time
period, that is to use the users power curve
as the sample unit, clustering a certain number
of user data sample unit. Therefore, this paper proposes a clustering model of FCM curve,
which is suitable for the estimation of power
consumption, and its description is as follows:
c X
n
X
J(X; M, Z) =
(ij )m ||xi zi ||2 (1)
i=1 j=1
Among them, n is the sample number of clusters, and c is the number of categories.
is a kind of fuzzy membership degree of a
certain type of samples. xi represents the
power data of the No.j sample, containing p
data. zi is a kind of cluster center, Z =
[z1 , z2 , . . . , zc ], zi Rn , m is fuzzy index.
Define the distance between the users electricity data and the cluster center:
2
Dij
= ||xj zi ||2
(2)
ij = Pc
we divides the time interval of the total sample area by this unique clustering curve. According to the load level of the unique cluster
curve, the time interval is determined by using the method of the mid-point selection.
The point on the time axis corresponding to the
middle point of the peak and valley or between
the peak and the flat is the point of the time
interval. The 24h in this area can be divided
into 3 main power use periods: General (flat)
period, peak period, and valley period.
We set the price of flat period is pf , on the basis of it, the peak and valley period under the
floating price respectively:
pp = pf (1 + )
(5)
pv = pf (1 )
(6)
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
5.2
(9)
i=1
P =
n
X
pi wi0
(10)
i=1
Sampling
r
1
n
1
[log( )]2 + 2 f log( ) (11)
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
i
1X
i =
ij
n j=1
6.1
(12)
EXAMPLE ANALYSIS
6.1.1
Means Update
Because the data is local information, the initial position of the cluster centroid often deviates from the cluster centroid of the original
data set. Therefore, it is necessary to update the
initial position by updating means. According
to the distance of the initial centroid, the remaining data samples which are not used to be
allocated to the nearest cluster:
= arg max(| i |2 )
i
(13)
are the sample properties whose class is undetermined, are the already identified categories.
When a data sample is filled with a cluster Ci
according to the above classification principle,
the mean value of the cluster is updated:
i
i ni +
ni + 1
ni ni + 1
(14)
(15)
6.1.2
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
6.1.3
Range
8 : 45 11 : 45&16 : 45 21 : 45
00 : 00 8 : 45&21 : 45 23 : 45
11 : 45 16 : 45
Measures
TOU Price
Floating 80%
0.810
0.450
Down 55%
0.202
side management. In accordance with the previous return calculation, we can be accurately
obtained if the user followed the electricity recommendation, the ideal energy savings is 1.04
yuan per day.
The proposed power recommendation and the
amount of return, is a demand side management signal for individual users, and can be
more reasonable to strengthen the demand side
management [15][16][17].
6.2
B2
7.34
36.23
74.20
109.96
122.35
166.83
233.37
296.54
428.04
C3
1.44
3.36
7.50
11.08
13.98
18.57
23.19
27.84
42.94
D4
5.11
10.78
9.89
9.92
8.75
8.98
10.06
10.65
9.97
E5
136.19
69.00
67.39
68.20
81.73
77.93
68.56
67.44
70.09
F6
695.78
744.00
666.43
676.91
715.41
700.09
690.03
718.28
698.69
44
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
demand side response, ease the power shortage pressure, and reduce the supply and consume power cost, but also improve the systems
overall energy utilization efficiency. So it can
achieve the long-term goal of environmental
protection and sustainable development.
REFERENCES
Figure 6. Relationship between direct clustering speed,
clustering speed, lifting speed ratio and data size
CONCLUSIONS
Based on FCM clustering and sampling algorithm, the electricity recommendation model is
proposed for the demand side. Through the actual data matlab simulation test, it is proved
that in the electric power big data environment
the sampling partition clustering has a faster
processing speed. With the increase of the
amount of data, it has obvious advantages compared with the direct clustering. In addition,
the power recommendation (TOU price, electrical mode, demand side response, etc.)That
the model give is clear and accurate to meet
the users electricity habits and characteristics.
The technology can be applied to the power
demand side management in the background
of intelligent power grid with big data. It can
not only mobilize the enthusiasm of the power
1
A means Quantity
B means Average time of direct clustering
3
C means Average time of sampling partition clustering
4
D means Lifting speed ratio
5
E means Speed of direct clustering
6
F means Speed of sampling partition clustering
2
[1] Zeng Ming, Power Demand Side Management, Beijing: China Electric Power
Press, 2001:1-8.
[2] Zhang Pei, Current Situation and
Prospect of Power Big Data Application, Electrical age, 2014(12):14.
[3] Nai Jiawen, Ms D Thesis, Research
and Development of Customer Powerexpenditure Information Intelligent Analysis System, Guangdong University of
Technology, 2014.
[4] Tang Ruiwei, Application Status and
Development Prospect of Electric Power
Big Data, China Electric Power Enterprise Association Science and Technology Development Service Center:
2014:7.
[5] Yan Longchuan, Li Yaxi, Li Binchen,
Opportunities and Challenges Faced by
Power Big Data, Electric power informatization: 2013,11(4):1-4.
[6] Balazs B, Janos A, Balazs F, Fuzzy clustering and data analysis toolbox [EB],
2006[2015-10-01].
[7] Liu Xiaocong, Wang Beibei, Li Yang,
Day-ahead Generation Scheduling
Model Considering Demand Side Interaction under Smart Grid Paradigm,
Chinese Journal of Electrical Engineering: 2013,01:30-38.
[8] Li Yin. Ms D Thesis, Research and
Application of Clustering Algorithm,
Jiangnan University, 2013.
45
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
46
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
ABSTRACT
Crop losses continue to increase due to
climate change and the presence of foreign pests.
However, it is difficult for farmers to reduce
crop losses because they cannot diagnose and
prescribe against pests quickly enough.
Therefore, in order to resolve the issue, this
paper describes a mobile-based, automatic
system for pest diagnosis and prescription using
a smart device with which to diagnose pests and
obtain prescription information by taking
photographs. In order to diagnose pests, image
searches based on similarity are conducted. Due
to the features of the image-similarity search,
sufficient data sets must be obtained in order to
increase search precision. In order to increase the
pest-image data set, images of pests were
collected using a focused web crawler on the
Internet. However, because there are many
images that do not pertain to the applicable pests,
the precision of diagnosis is reduced. Therefore,
image precision was increased through an
inspection system that utilizes experts. The
images obtained with the pest-image collection
and search system is indexed using an image
similarity-based search system. Next, the
similarity of images of pests taken with the
users cell phone is compared, and information
on diagnosis and prescription is shown to the
user in real time. When the system-diagnosis
performance was measured using three crops
(pears, strawberries and grapes), a precision
level of 83% was recorded. In the future, a video
*
searches
1 INTRODUCTION
Although various smartphone applications for
the identification of crop pests are being
developed amid the rising demand for diagnosis
and prescription against loss-inducing crop pests,
such apps remain incapable of analyzing images
obtained using a smartphone in a program and
autonomously diagnosing diseases. Therefore,
in this project the images and information on
pest diagnosis and prescription were saved in a
database. Additionally, in order to collect only
the most appropriate images, unnecessary
images are eliminated through an imageinspection system in which experts participate,
and clear images of pests are selected and saved
in the "pest" database in order to provide precise
images. Through a collection system that
consumes just one-tenth of the time previously
required, the applicable image-inspection
Corresponding author
47
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Semi-expert A
3 SYSTEM DESIGN
Semi-expert B
Case 2
Collection database
Case 3
Similarity-based search
Expert
Pest-diagnosis system
49
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
50
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Figure 3. ER diagram
51
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
52
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Smart Pest
Smart Pest
Choose
File
Camera
Gallery
Symptoms
Although the disease occurs on pear trees? leaves, leaf s
talks, fruits, fruit stalk, branches, and so on, usually da
mages to leaves and fruits are the greatest. At first, uncl
ear monolithic or elliptical lesions appear along the lea
ves veins, and then this symptom progresses, and count
less sooty shaped spores appear. The greatest damages t
o diseased leaves is early falling of leaves to hinder the
process of assimilation. On fruits, black spot lesions ap
pear from the early stage, and the symptom progresses
so that the lesions becomes sooty shaped. If severe, the
fruit surface becomes shaped like a scab, and the fruit b
ecomes sunken as a result, and at times deformed fruits
result.
5 PERFORMANCE COMPARISON
To measure the performance of the pestcollection/inspection system, we compared the
number of images collected by using the
inspection system and the number of images
inspected without using the search system
during a given period of time. Additionally, the
level of precision was measured in order to
assess the performance of a similarity-based
search system on mobile-based automatic pest
diagnosis and prescription systems.
5.1 Performance of the System for Pest
Collection and Inspection
Copied to Clipboard
53
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
152
140
120
100
10.86X
80
60
40
14
20
0
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Fire
blight
Black spot
Pears
Gray
mildew
Powder
mildew
Downy
mildew
Strawberries
Ranking
Phomopsis
blight
Rust
Grapes
Voting
54
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
ACKNOWLEDGEMENT
This work was supported by Korea Institute of
Planning and Evaluation for Technology in Food,
Agriculture, Forestry and Fisheries(IPET)
through (Advanced Production Technology
Development Program), funded by Ministry of
Agriculture, Food and Rural Affairs(MAFRA)
(No 315091-3) and the MSIP (Ministry of
Science, ICT and Future Planning), Korea, under
the Global IT Talent support program(IITP2016-H0905-15-1005) supervised by the IITP
(Institute for Information and Communication
Technology Promotion)
REFERENCES
[1] J.I.Kim, K.H.Lee, A Study of Contents Service
System Using Open API,International Conference
on Multimedia Information Technology and
Applications(MITA), 342-345, 2009.
[2] https://developers.google.com/products/?hl=ko.
[3] T.Brants, Inter-Annotator Agreement for a German
Newspaper Corpus, In Second International
Conference on Language Resources and Evaluation
LREC-2000.
[4] U.S.Khan, J.Iqbal, M.A.Khan, Automatic Inspection
System Using Machine Vision, 34th Applied
Imagery and Pattern Recognition Workshop
(AIPR05), pp.210-217, 2005.
[5] J.Iivarinen, J.Pakkanen, J.Rauhamaa Content-Based
Image Retrieval in Surface Inspection.
[6] http://ncpms.rda.go.kr/npms/FoodImageListR.np,
National Crop Pest Management System(NCPMS).
[7] http://nongup.gg.go.kr/works/27,Gyeonggido
Agricultural Research& Extension Service.
[8] http://www.cnnongup.net/html/kr/tech/tech_04_03.h
tml,
CHUNGCHEONGNAM-DO
Agricultural
Research & Extension Services.
[9] http://www.agri.jeju.kr/, JEJU Agricultural Research
& Extension Services.
[10] K.JAGAN, M.Balasubramanian. Recognition of
Paddy Plant Diseases Based on Histogram Oriented
Gradient Features. International Journal of Advanced
55
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
56
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Monitoring of events in SOA architecture for Real Time Financial Decision System
Dominik Ryko* and Pawe Gawiski**
*Warsaw University of Technology, **Softman
*Nowowiejska 15/19, 00-665 Warsaw, **Gen. Okulickiego 5F, 05-500 Piaseczno
*d.ryzko@ii.pw.edu.pl, **pawel.glawinski@softman.pl
ABSTRACT
Most of the financial decision systems implemented
to day are based on aggregation of transactions in
data warehouses or other reporting environments and
then generating appropriate reports for the analysts
and managers. This makes the decision cycle, as
counted from an individual transaction or event, very
long. On the other hand modifying functional
workflows to embed financial controlling steps
imposes technological challenges related to change
management and additional delays. The paper
proposes an innovative approach to solving the
above problems, by implementing a multi-agent
system for monitoring of financial systems and
providing real-time, flexible and efficient way for
decisions. The research was conducted by Warsaw
University of Technology and Softman as a part of a
project financed by The National Center for Research
and Development in Innovative Economy
Programme (POIG) measure 1.4 project No:
POIG.01.04.00-14-061/12.
KEYWORDS
Service-Oriented
Architecture,
Mutli-Agent
Systems, distributed systems, real time analytics,
controlling systems
1 INTRODUCTION
In this Chapter motivation for the research as
well as previous approaches found in the
literature are described. The business need
which is solved by the proposed solution is also
analysed.
1.1 Motivation
The Open Group defines formally SOA in the
following way:
57
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Figure 2
Four different ways of getting the data into the
Aggregated Reporting are proposed:
Actively calling other services - use of
other services contracts to get new data
Passively getting data from services subscribing to batch data exports or
events
Service SQL push - services export a
view of internal data
ETL SQL push - as in the option above
but with the involvement of external
ETL tool
The advantage of using Aggregated Reporting
include:
Holding of immutable data with
possible versioning if changes are
received
Providing single SQL interface for reporting
58
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
59
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
60
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Figure 3
Data can be captured from various systems by
the plugins according to the predefined
configuration. Then it is physically extracted and
enriched with metadata, such as time, subsystem
etc. Such prepared data is transferred to the
analytical modules.
3.3 System performance
Performance requirements for the system were
estimated based on the analysis of business
processes on the financial services market. The
maximum number of financial instruments of
the credit type granted by leading companies on
the financial market doesn't exceed one
thousand. Conclusion of such a number of
agreements depending on the availability and
attraction of the product can be associated with
the need for substantial amount of operational
processes. We have assumed that 10 000
processes of granting the credit instrument will
be initiated. The process consists of around 25
steps connected to web services. A scope of
business and operating information is on average
50 elements. For the daily after-sales service we
should adopt the same information requirements
as for sale processes. To sum up, we create one
61
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
REFERENCES
1. D.Ryko and A.Ihnatowicz. Multi-agent
Approach to Monitoring of Systems in
SOA Architecture. In New Challenges
for Intelligent Information and Database
Systems (pp. 309-318). Springer Berlin
Heidelberg, 2011
2. A.Miede,
N.Repp,
J.Eckert,
R.Steinmetz, Cooperation Mechanisms
for Minitoring Agents in Serviceoriented Architectures. Tagungsband der
9.
internationalen
Tagung
Wirtschaftsinformatik 2009, vol. 1, p.
749-758,
sterreichische
Computer
Gesellschaft, February 2009
3. M. P. Papazoglou. Service-oriented
computing: Concepts, characteristics and
directions, Web Information Systems
Engineering, 2003. WISE 2003.
Proceedings of the Fourth International
Conference on , pages 312. IEEE, 2003.
62
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
ABSTRACT
Recently, several kinds of smart devices are coming available at almost every environment. And
Data mining becomes very much popular and useful for behavior analysis and decision making. In
this study, we will apply some smart devices, data
mining approach and visualization into treatment of
driving characteristics. Data acquisition of driving
characteristics has been achieved by means of smart
devices, such as iPhone and Android device. And
its data analysis has been executed together with
simple SQL database and some kind of statistical
data processing facilities. Now we will try to visualize driving characteristics and extract some useful
information for drivers/ road managers through the
above data acquisition and analysis.
KEYWORDS
Smart Phone, Visualization of Behavior, Machine
Learning.
INTRODUCTION
Day by day, the presence of the car has become indispensable as shifting means of our
everyday life. Although traffic accident occurrence number tends to decrease, but 40% of
such accidents have occurred at the traffic intersections. Almost drivers have to be careful
for such intersections because they are the very
places where several kinds of drivers skill encounter one another nearly at the same time.
Drivers from beginners to proficiency must
get their hands around driving habits, tendencies and/or characteristics in order to avoid
improperly-driving behavior, which may probably lead to traffic accidents. So they will need
to visualize their driving behavior and characteristics as easily as possible. As you know,
ISBN: 978-1-941968-38-32016 SDIWC
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
RELATED WORKS
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
CONFIGURATION,
MANIPULATION, AND DATA ACQUISITION
system configuration and dataflow
As known in the previous sections, smart devices can allow us to acquire the following
sensored data such as GPS, compass, gyroscope, accelerometer, and so on. For example, data from GPS facility can provide us with
not only navigation but also position-located
several useful information. And information
from compass, gyroscope and accelerometer
can bring the other following location-based
and/or movement-sensing applications to us,
such as detecting direction and/or orientation,
characterizing behaviour and habit of movements, and recognizing physical situation and
environment.
So we have begun to acquire several kinds
ISBN: 978-1-941968-38-32016 SDIWC
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Figure 4. LtNo
Figure 5. LtAc
66
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
acquired data
18 times
72 (CSV files)
4 sets
4 sets
6 sets
58 sets
Figure 7. LtOv
5. RMS: root-mean-square for x-, y-, and zaxis; ones for pitch, roll and yaw. (3+3
= 6 elements)
6. Average intensity of 3-axis composite
value and pitch/roll/yaw composite value.
(1+1= 2 elements)
7. Dispersion intensity of 3-axis composite
value and pitch/roll/yaw composite value.
8. SMA: Normalized Signal Magnitude
Area[6][7] of 3-axis composite value and
67
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
ways to divide the original sample into a training and a validation set. And we had obtained
good recognition rate(R = 52.73%) with empirically optimal k = 7 after choosing k to
be an odd number from 1 to 19 via bootstrap(=counting up) method. Table 2 is a result of average of rate for right answers from
8-fold cross-validation after every single subset is retained as the validation data for testing
the model, and other remaining 7 subsets are
used as training data consequently.
Table 2. Classification of Driving Behaiviour
4.1
LtNo
LtAc
LtBr
LtOv
An SVM model is a representation of the examples as points in space, mapped so that the
examples of the separate categories are divided
by a clear gap that is as wide as possible. New
examples are then mapped into that same space
and predicted to belong to a category based on
which side of the gap they fall on.
We had employed SVM with Gaussian kernel applied to the usable dataset given in Table 1. And we had obtained good recognition
rate(R = 55.94%) with gamma value: =
0.05011872 and cost value: C = 50.11872.
Table 3 is a result of average of rate for right
answers based on the condition with the above
good recognition rate(R = 55.94%).
Table 3. Classification of Driving Behaiviour
LtNo
LtAc
LtBr
LtOv
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
structed from a data set using a distance function. As the dimension increases, the degree
of distribution of the k-NN digraph becomes
skewed with a peak on the right because of
the emergence of a disproportionate number of
hubs, that is, data-points that appear in many
more k-NN lists of other data-points than the
average. This phenomenon2 can have a considerable impact on various techniques for classification (including the k-NN classifier), semisupervised learning, and clustering, and it also
affects information retrieval.
Principal component analysis (PCA) is a statistical procedure that uses an orthogonal transformation to convert a set of observations of
possibly correlated variables into a set of values of linearly uncorrelated variables called
principal components. Our PCA analysis has
revealed that the top 5 components explains
approximately 87.76% of the usable data set
(shown in Table 4). It is sure that reduction
of the total dimension can be carried our by
elimination of non-contributed component(s)
according to the above PCA, because Table 4
shows analyzed results by our PCA and indicates that the score of Cumulative Proportion(CP) is more than 87% within the 5 components,
1. Average of movement intensity: accelerations for x-, y-, and z-axis; ones for pitch,
roll and yaw. (3+3 = 6 elements)
2. Maximal power spectra for x-, y-, and zaxis; ones for pitch and roll. (3+2 = 5
elements)
3. RMS: root-mean-square for y- and z-axis;
one for roll. (2+1 = 3 elements)
Consequently, we are now ready to compute
the above 14 dimensional elements of data set
for improved pattern recognition for classification of driving behavior.
4.3 classification by machine learning(II)
At k-NN application to recognition of driving
characteristics, at first, we have obtained good
recognition rate(R = 58.16%) with empirically optimal k = 3 after choosing k to be an
odd number from 1 to 19 via bootstrap method
and Table 5, which is a result of average of
rate for right answers from exhaustive crossvalidation after every single subset is retained
as the validation data for testing the model, and
other remaining subsets are used as training
data consequently.
Table 5. Improved Classification of Driving Behaiviour
So-called curse of dimensionality refers to various phenomena that arise when analyzing and organizing data in highdimensional spaces.
LtNo
LtAc
LtBr
LtOv
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
rate(R = 60.13%). Just like the case of kNN application, it is confirmed that recognition rate of Table 6 has been improved than one
of Table 3 and PCA-based dimensionality reduction contributes to precision improvement
of this classification, too.
Table 6. Improved Classification of Driving Behaiviour
LtNo
LtAc
LtBr
LtOv
4.4
Consideration
Times (Percentage)
23 (25.0%)
39 (42.4%)
12 (13.0%)
18 (19.6%)
CONCLUSION
This paper describes our system configuration of data transmission between smart devices and Web server with SQL database facility, data mining application about driving
characteristics recognition based on machine
learning such k-NN and SVM, and practical
ISBN: 978-1-941968-38-32016 SDIWC
70
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
KEYWORDS
national project, digitization, digital content,
tablets, tablet classroom
1 INTRODUCTION
The national project Electronising of the
educational system of regional schools should
carry and build a functional electronic
education system in Slovakia and introduce
electronic services to the operation. It also
includes the establishment and equipment of
digital classes, the customization of digital
content and finally the training of selected
staff to ensure the further education of the
pedagogical staff. It is financed from EU
structural funds under the operational
programme Informatisation of society and
DIGITAL EDUCATIONAL
CONTENT
The digital learning content is an important
tool and an aid for the teachers to facilitate
their work and increases the attractiveness of
the learning for the pupils. Its implementation
is a logical step at present based on
widespread use of the information and the
communication technologies with the
interactive character. [1]
Making the digital educational content the
possibilities for teachers will significantly
improve in the field of visualization of more
complex processes, of actively involving
students or connecting theoretical knowledge
with practice. Thus it represents a very
convenient and useful supplement to existing
printed textbooks. Compared to them,
however, it can be much easier to correct or
update.
2.1 Planet of knowledge
Planet of knowledge is the first major project
of digitization of educational content in line
71
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
72
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
73
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
cooperation
of
national
projects
Electronisation of the Educational System of
Regional Schools (Digital school) and
Activating Methods in Education.
3.1 School final projects
All schools involved in the project (both
tablet and non-tablet ones) committed in their
applications to the project to the development
of so-called "school projects". The schools
were committed to develop the following
projects: [5]
Mandatory topic for all involved primary and
secondary schools:
- 1 video, a multimedia presentation and
a methodical material to the topic: We
like Slovakia
Optional topic one of the following:
- 1 video and a methodical material to
the topic: Video experiments
- 1 video and a methodical material to
the topic: I learn, I teach you
- 1 dance video in the competition The
2014/2015 SCHOOL DANCE
3.2 Tablets Samsung Galaxy Note 10.1
Under the project Digital School, there were
delivered to schools tablets with the following
parameters:
Android 4.1.2
microphone, speaker
IrLED
volume button
S Pen
74
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
75
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
76
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
5.3 Clarisketch
5.1 Socrative
Socrative is a product of Mastery Connect. This is
an application designed for testing pupils. It can
be freely downloaded at the Google Play. The
application supports only Android operating
system what is a disadvantage for tablets running
Windows. The application is free for both teachers
and pupils disadvantages are small ads like in all
free applications. The only supported language is
English
5.2 Mindomo
It is a program designed just for creating mind
maps and their presentation. It is possible to put
into it different images and it disposes different
types of transitions. Mindomo supports all
platforms and can be downloaded at any store
such as Google Play.
The program can be downloaded for free and it is
possible to create freely in it only 3 maps.
Mindomo contains wide range of languages. The
work with it is simple. It also offers a number of
already pre-prepared images, the option to import
them or use video [9].
Conclusion
Every day the teachers are looking for the
ways to make their learning more efficient
and more fun through the use of mobile
devices. Currently it is a number of advanced
tools which can be used to improve the
teaching in the classroom.
To sum up the key messages which the
project Digital School sends and its impact on
the teaching process, they are as follows:
1. Creating of an electronic educational
system and acceleration of the process
of implementation of electronised
services and digital technologies at
schools.
2. Creating of digital educational content
and its distribution in accordance with
the state educational program of the
Slovak republic.
3. Creating of eGOV services system,
i.e. creating and accessing of school
educational program, accessing of
digital educational content and an
electronic testing of childrens school
readiness. [6]
Figure 13 Mindomo
77
The Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016), Poland 2016
Acknowledgements
The article was prepared within the project
TA04031376 Research/development training
methodology aerospace specialists L410UVPE20. This project is supported by
Technology Agency Czech Republic.
REFERENCES
[1] The central information portal of the Ministry of
Education Slovak republic. Online:
<https://www.iedu.sk/digipedia/elektronizacia_rs/
Stranky/default.aspx>
[2] Planet of knowledge - information portal of the
Ministry of Education. SR Online:
<https://www.iedu.sk/digipedia/planeta_vedomost
i/Stranky/default.aspx>
[3] Why digital learning content.
Online:
<https://www.iedu.sk/digipedia/preco_dvo/Strank
y/default.aspx>
[4] Digikola - NP Electronising education system's
Regional Education.
Online: <https://www.minedu.sk/digiskola-npelektronizacia-vzdelavaciehosystemu-regionalneho-skolstva/>
[5] Digikola coming to school.
Online: <https://www.minedu.sk/do-skolprichadza-digiskola/>
[6] The training for eGov Services Creating the
Schools education program.
Online: <http://skoly.digiskola.sk/skoly/>
[7] Project School to touch Online:
http://www.skolanadotyk.sk/o-projekte.html
[8] SOCRATIVEVIDEOS.
2014.
Socrative
Overview Online:
https://www.youtube.com/watch?v=gzNrXd5Xpu
4
[9] MS. KELLY GARTLAND. 2014. Mindomo
Demo. Online:
https://www.youtube.com/watch?v=Q6SVnms6D
-w
[10] GUNAGA, J.: Use of freeware software in
maths and natural sciences in primary education
In: Studia Scientifica Facultatis Paedagogicae :
Universitas Catholica Ruomberok. - ISSN 13362232, Ro. 12, . 3 (2013), s. 227-234.
[11] MAZZELLA, A - TESTA, I. 2016. An
investigation into the effectiveness of smartphone
experiments on students' conceptual
knowledge about acceleration. Physics Education,
Volume 51 (2016), Number 5.
78