323,716 research outputs found

    An Innovative Workspace for The Cherenkov Telescope Array

    Get PDF
    The Cherenkov Telescope Array (CTA) is an initiative to build the next generation, ground-based gamma-ray observatories. We present a prototype workspace developed at INAF that aims at providing innovative solutions for the CTA community. The workspace leverages open source technologies providing web access to a set of tools widely used by the CTA community. Two different user interaction models, connected to an authentication and authorization infrastructure, have been implemented in this workspace. The first one is a workflow management system accessed via a science gateway (based on the Liferay platform) and the second one is an interactive virtual desktop environment. The integrated workflow system allows to run applications used in astronomy and physics researches into distributed computing infrastructures (ranging from clusters to grids and clouds). The interactive desktop environment allows to use many software packages without any installation on local desktops exploiting their native graphical user interfaces. The science gateway and the interactive desktop environment are connected to the authentication and authorization infrastructure composed by a Shibboleth identity provider and a Grouper authorization solution. The Grouper released attributes are consumed by the science gateway to authorize the access to specific web resources and the role management mechanism in Liferay provides the attribute-role mapping

    Improving Primo Usability and Teachability with Help from the Users

    Get PDF
    In the aftermath of a consortium migration to a shared cloud-based resource management and discovery system, a small college library implemented a web usability test to uncover the kinds of difficulties students had with the new interface. Lessons learned from this study led to targeted changes, which simplified aspects of searching, but also enhanced the librarians’ ability to teach more effectively. The authors discuss the testing methods, results, and teaching opportunities, both realized and potential, which arose from implementing changes

    Orchestrating the spatial planning process: from Business Process Management to 2nd generation Planning Support Systems

    Get PDF
    Metaplanning can be considered as a necessary step for improving collaboration, transparency and accountability in sustainable and democratic spatial decision-making process. This paper reports current findings on the operational implementation of the metaplanning concept developed by the authors relying on Business Process Management methods and techniques. Two solutions are presented which implement spatial planning process workflows thanks to the development of original spatial data and processing services connectors to a Business Process Management suite. These results can be considered as a first step towards the development of 2nd generation Planning Support Systems

    A collective intelligence approach for building student's trustworthiness profile in online learning

    Get PDF
    (c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which has become one of the most influencing learning paradigms. In this context, e-Learning stakeholders, are increasingly demanding new requirements, among them, information security is considered as a critical factor involved in on-line collaborative processes. Information security determines the accurate development of learning activities, especially when a group of students carries out on-line assessment, which conducts to grades or certificates, in these cases, IS is an essential issue that has to be considered. To date, even most advances security technological solutions have drawbacks that impede the development of overall security e-Learning frameworks. For this reason, this paper suggests enhancing technological security models with functional approaches, namely, we propose a functional security model based on trustworthiness and collective intelligence. Both of these topics are closely related to on-line collaborative learning and on-line assessment models. Therefore, the main goal of this paper is to discover how security can be enhanced with trustworthiness in an on-line collaborative learning scenario through the study of the collective intelligence processes that occur on on-line assessment activities. To this end, a peer-to-peer public student's profile model, based on trustworthiness is proposed, and the main collective intelligence processes involved in the collaborative on-line assessments activities, are presented.Peer ReviewedPostprint (author's final draft

    Optimization of Scheduling and Dispatching Cars on Demand

    Get PDF
    Taxicab is the most common type of on-demand transportation service in the city because its dispatching system offers better services in terms of shorter wait time. However, the shorter wait time and travel time for multiple passengers and destinations are very considerable. There are recent companies implemented the real-time ridesharing model that expects to reduce the riding cost when passengers are willing to share their rides with the others. This model does not solve the shorter wait time and travel time when there are multiple passengers and destinations. This paper investigates how the ridesharing can be improved by using the genetic algorithm that gives the optimal solution in terms of passengers wait time and routes duration among passengers’ start and end locations. The simulator uses the Google digital maps and direction services that allow the simulator to fetch the real-time data based on the current traffic conditions such as accident, peak hours, and weather. The simulation results that are sub-optimal routes are computed using the advanced genetic algorithm and real-time data availability
    • …
    corecore