442,651 research outputs found

    A Voice-Enabled Framework for Recommender and Adaptation Systems in E-Learning

    Get PDF
    With the proliferation of learning resources on the Web, finding suitable content (using telephone) has become a rigorous task for voice-based online learners to achieve better performance. The problem with Finding Content Suitability (FCS) with voice E-Learning applications is more complex when the sight-impaired learner is involved. Existing voice-enabled applications in the domain of E-Learning lack the attributes of adaptive and reusable learning objects to be able to address the FCS problem. This study provides a Voice-enabled Framework for Recommender and Adaptation (VeFRA) Systems in E-learning and an implementation of a system based on the framework with dual user interfaces – voice and Web. A usability study was carried out in a visually impaired and non-visually impaired school using the International Standard Organization’s (ISO) 9241-11 specification to determine the level of effectiveness, efficiency and user satisfaction. The result of the usability evaluation reveals that the prototype application developed for the school has “Good Usability” rating of 4.13 out of 5 scale. This shows that the application will not only complement existing mobile and Web-based learning systems, but will be of immense benefit to users, based on the system’s capacity for taking autonomous decisions that are capable of adapting to the needs of both visually impaired and non-visually impaired learners

    Web-based Hypermedia Courseware in Higher Education: A Proposed Framework

    Get PDF
    This thesis is concerned with hypermedia and learning, and in particular with the design and development factors that need to be considered for the creation of hypermediabased courseware in higher education that uses the Web as a delivery platform. One of the most commonly cited problems with educational hypermedia is related to the design and structure of the educational material. It appears that Web-based instructional authors have not had access to an instructional model, which has been empirically tested. However, there is a large body of knowledge in the field of instructional design from which one can draw suitable conclusions for the design process of Web-based educational hypermedia. The current research recommends that a precondition for effective Web-based courseware design in higher education is careful consideration of the traditional body of knowledge in the field of instructional design which should act as a foundation for future developments in the design process. In addition, the end-users' input should be sought as it can confirm the above and enhance further our understanding toward the implementation of this new medium in higher education. Based on this recommendation, a framework is proposed in terms of its design, user input and evaluation for the development of Web-based courseware in higher education aimed at supporting the delivery of physical modules. The thesis describes how the different stages of the proposed framework were implemented through the develop moot of two Web-based courseware applications aimed at supporting the delivery of two higher education modules taught in De Montfort University, U.K. In order to test the validity of the proposed approach, that a Web-based courseware developed according to the experimental framework could effectively support the delivery of physical modules compared with conventional teaching methods, two empirical studies have been conducted. They were concerned with the summative evaluation of the two Web-based courseware applications, which were developed according to the proposed framework. The results from the evaluation of the two empirical studies indicated significant improvements in users' performance and satisfaction compared with conventional teaching methods. Thus, the proposed framework can indeed offer a solution for the development of Web-based courseware that aims to support the delivery of physical modules in higher education. Moreover, the experimental framework can also provide a detailed starting point and can be adapted for the design and development of Web-based courseware aimed at addressing distance learning or other forms of Web instruction.Greek State Scholarship Foundation (IKY

    Penetration testing model for mobile cloud computing applications / Ahmad Salah Mahmoud Al-Ahmad

    Get PDF
    Mobile cloud computing (MCC) technology possess features mitigating mobile limitations and enhancing cloud services. MCC application penetration testing issues are complex and unique which make the testing difficult for junior penetration testers. It is complex as MCC applications have three intersecting vulnerability domains, namely mobile, web, and cloud. The offloading process adds uniqueness and complexity to the MCC application penetration testing in terms of generating, selecting and executing test cases. To solve these issues, this thesis constructs a model for MCC application penetration testing that reduces the complexity, tackles the uniqueness and assists junior testers in conducting penetration tests on MCC applications more effectively and efficiently. The main objectives of this thesis are to discover the issues in conducting penetration testing on MCC applications and to construct and evaluate MCC application penetration testing model. Design science research methodology is applied with four phases: (i) Theoretical framework construction phase (ii) Model construction phase entails designing the components and processes of MCC application penetration to reduce the complexity and address offloading; (iii) Model implementation phase implements the components and processes of the model into model guidelines and integrated tool called PT2-MCC. This tool manages the repositories, generates and selects test cases, and implements the mobile agent component; (iv) Model evaluation phase applies case study approach and uses an evaluation framework to evaluate the model against selected testing quality and performance attributes. In model evaluation phase, a junior penetration tester conducted two case studies on two MCC applications built by extending two open source native mobile applications

    Using Geographic Information System (GIS) in a local government--a case study of GIS implementation in Ascension Parish Government, Louisiana

    Get PDF
    The objective of this paper is to argue for a new model of Geographic Information System (GIS) implementation, Web-based GIS, for supporting decision-making in local government. In this paper, the GIS implementation in Ascension Parish Government, Louisiana is used as a case study to show how Web-based GIS implementation can improve the system use and maximize the value of GIS infrastructures for the community. The author first defines the concept of implementation and role of GIS in local government as a base for further discussion. Special attention is given to analyze the variables that influence the parish employees’ acceptance and use of the GIS in the work. A three-level evaluation framework is established to evaluate GIS implementation strategy and GIS impacts on decision-making in local government. Research findings will be used to direct future implementation strategy. The paper concludes that Web-based GIS, by combining GIS technology and Internet technology, can distribute GIS resources and geo-processing tools to a wider range of potential users. In addition, flexible user-oriented GIS applications can best be developed with intensive user participation and feedback. One of the arguments proposed is that the Web-based GIS can be used to help the local government employees to provide better service for the public and improve the performance of a specific local government agency in processing land development permit applications

    Efficient Transaction Processing for Short-Lived Transactions in the Cloud

    Get PDF
    The cloud, in the past few years, has become the preferred platform for hosting web applications. Many of these web applications store their data in a distributed cloud storage system, which greatly simplifies application development and provides increased availability and reliability. However, with increasing user demand for web applications, these cloud storage systems often become the performance bottleneck. To address the cloud's performance demands, many storage system features, such as strong consistency and transactional support, are often omitted in favour of performance. Nonetheless, transactions remain necessary to ensure data integrity and application correctness. In this thesis, we introduce CrossStitch, which is an efficient transaction processing framework for distributed key-value storage systems. CrossStitch supports general transactions, where transactions include both computation and key accesses. It is specifically optimized for short-lived transactions that are typical of cloud-deployed web applications. In CrossStitch, a transaction is partitioned into a series of components that form a transaction chain. These components are executed and the transaction is propagated along the storage servers instead of being executed on the application server. This chained structure, in which servers only communicate with their immediate neighbours, enables CrossStitch to implement a pipelined version of two-phase commit to ensure transactional atomicity. CrossStitch is able to eliminate a significant amount of setup overhead using this structure by executing the transaction and the atomic commit protocol concurrently. Therefore, CrossStitch provides low latency and efficient transactional support for cloud storage systems. Our evaluation demonstrates that CrossStitch is a scalable and efficient transaction processing framework for web transactions

    Distributed Selfish Coaching

    Full text link
    Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node's resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage at each node. Motivated by content networking applications -- including web caching, CDNs, and P2P -- this paper extends our previous work on the on-line version of the problem, which was conducted under a game-theoretic framework, and limited to object replication. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache management policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that on-line cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. To appear in a substantial manner, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the "outlier" characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes. Our framework utilizes a simple control-theoretic approach to dynamically parameterize the cache management scheme. We show performance evaluation results that quantify the benefits from instantiating such a framework, which could be substantial under skewed demand profiles.National Science Foundation (CNS Cybertrust 0524477, CNS NeTS 0520166, CNS ITR 0205294, EIA RI 0202067); EU IST (CASCADAS and E-NEXT); Marie Curie Outgoing International Fellowship of the EU (MOIF-CT-2005-007230

    A RESTful Rule Management Framework for Internet of Things Applications

    Get PDF
    Web technologies are currently regarded as key enabling factors for the Internet of Things (IoT), and substantial effort is being dedicated to bringing sensors and data from the real world to the Web. In addition, rule-based automation mechanisms are expected to play a significant role in the effective integration of the physical world with the virtual world by leveraging a trigger-action paradigm. Although several rule engines are already available, limited effort has been devoted to rule-based solutions that are tailored to the IoT and consider rule configurability and extensibility according to application requirements. In this work, we propose a RESTful rule management framework for IoT applications that satisfies these requirements. The framework is centered around a resource-based graph, which enables the uniform representation of things (e.g., sensors and domain entities) and rules as URI-addressable resources. We describe the design and implementation choices of the main rule management features (rule scheduling, activation and RESTful operations for managing rules at various levels of configurability and extensibility). Finally, we present a case study and performance evaluation results regarding the use of this rule management framework in a set of school buildings that were part of a real-world IoT deployment that was realized within the Horizon 2020 GAIA research project, with the objective of promoting energy -saving behaviors in school communities
    • …
    corecore