226 research outputs found

    Learning environment based on social networks: EPSCCommunity

    Get PDF
    Today, working in an open and collaborative skills is one of the most demanded in the ICT world to which we are oriented. To this end we believe is essential to have tools and technologies that facilitate and encourage this ability to develop our capabilities in an appropriate manner. The purpose of this project is to design and implement a tool to facilitate group work within the different courses and subjects of the EPSC. The basic idea is to establish a social network formed only by users of the EPSC, which can create groups of subjects managed with by the teacher. This would define different user profiles (student, teacher, guest ...) each having special characteristics and functions different from the others, providing them with more or less depending on the profile permissions. The information would also be subject to different types of view, depending on which users could see a group of a subject, all users ... being a common forum for both general events (demonstrations, lectures, open tables ...) as a way to share information and discoveries while working with your group, as your class or around the world. The initial idea is to implement the use of freeware tools and technologies such as Tomcat, My SQL Server, Spring, Struts, Hibernate, J2ee, jquery-ui, etc,. To conduct a pilot project, and if it works, it could generate a stronger infrastructure in the future

    Learning environment based on social networks: EPSCCommunity

    Get PDF
    Today, working in an open and collaborative skills is one of the most demanded in the ICT world to which we are oriented. To this end we believe is essential to have tools and technologies that facilitate and encourage this ability to develop our capabilities in an appropriate manner. The purpose of this project is to design and implement a tool to facilitate group work within the different courses and subjects of the EPSC. The basic idea is to establish a social network formed only by users of the EPSC, which can create groups of subjects managed with by the teacher. This would define different user profiles (student, teacher, guest ...) each having special characteristics and functions different from the others, providing them with more or less depending on the profile permissions. The information would also be subject to different types of view, depending on which users could see a group of a subject, all users ... being a common forum for both general events (demonstrations, lectures, open tables ...) as a way to share information and discoveries while working with your group, as your class or around the world. The initial idea is to implement the use of freeware tools and technologies such as Tomcat, My SQL Server, Spring, Struts, Hibernate, J2ee, jquery-ui, etc,. To conduct a pilot project, and if it works, it could generate a stronger infrastructure in the future

    THE USE OF RECOMMENDER SYSTEMS IN WEB APPLICATIONS – THE TROI CASE

    Get PDF
    Avoiding digital marketing, surveys, reviews and online users behavior approaches on digital age are the key elements for a powerful businesses to fail, there are some systems that should preceded some artificial intelligence techniques. In this direction, the use of data mining for recommending relevant items as a new state of the art technique is increasing user satisfaction as well as the business revenues. And other related information gathering approaches in order to our systems thing and acts like humans. To do so there is a Recommender System that will be elaborated in this thesis. How people interact, how to calculate accurately and identify what people like or dislike based on their online previous behaviors. The thesis includes also the methodologies recommender system uses, how math equations helps Recommender Systems to calculate user’s behavior and similarities. The filters are important on Recommender System, explaining if similar users like the same product or item, which is the probability of neighbor user to like also. Here comes collaborative filters, neighborhood filters, hybrid recommender system with the use of various algorithms the Recommender Systems has the ability to predict whether a particular user would prefer an item or not, based on the user’s profile and their activities. The use of Recommender Systems are beneficial to both service providers and users. Thesis cover also the strength and weaknesses of Recommender Systems and how involving Ontology can improve it. Ontology-based methods can be used to reduce problems that content-based recommender systems are known to suffer from. Based on Kosovar’s GDP and youngsters job perspectives are desirable for improvements, the demand is greater than the offer. I thought of building an intelligence system that will be making easier for Kosovars to find the appropriate job that suits their profile, skills, knowledge, character and locations. And that system is called TROI Search engine that indexes and merge all local operating job seeking websites in one platform with intelligence features. Thesis will present the design, implementation, testing and evaluation of a TROI search engine. Testing is done by getting user experiments while using running environment of TROI search engine. Results show that the functionality of the recommender system is satisfactory and helpful

    Archetype based intelligent system for healthcare interoperability

    Get PDF
    Tese doutoramento - Programa Doutoral em Engenharia BiomĂ©dicaThe healthcare arena configures an environment of both complexity and cooperation, in which numerous and distinct information systems must exchange information in a expedite and consolidated manner. Where healthcare interoperability is concerned several techniques, methodologies, architectures and standards exist. However subjects such as service distribution, fault tolerance, standards, communication flavoring and tightly-bound systems still are a major issue of concern. This work studies and researches the best methodologies to imbue intelligent behaviours combined with ontology and moral awareness into multi-agents system applied to healthcare environments. Its core objective is to propose, develop, implement and evaluate an archetype for an interoperability platform oriented towards the healthcare environment. This archetype was validated in several implementation in different major healthcare institutions. It is based in an agent framework named JADE and is adapted and oriented towards the healthcare environment. Henceforth the resulting archetype addresses the existing limitations in past and present solutions regarding healthcare interoperability. It explores the limits of intelligent behaviours in multi-agent systems applied to interoperation procedures in healthcare, towards the improvement of the reliability and quality of information exchanged.A ĂĄrea da saĂșde configura um ambiente de grande complexidade e cooperação onde inĂșmeros e distintos sistemas de informação tĂȘm que trocar informação entre si de uma forma expedita e consolidada. No Ăąmbito da interoperabilidade hospitalar existem vĂĄrias tĂ©cnicas, metodologias, arquiteturas e standards. No entanto, temas como distribuição de serviços, tolerĂąncia Ă  falha, standards, flavouring de comunicaçÔes e sistemas fortemente acoplados, continuam a ser um importante fonte de preocupação. Este trabalho estuda e pesquiza as melhores metodologias de embeber comportamentos inteligentes combinados com ontologias e noçÔes morais em sistemas multi-agentes aplicados a ambientes hospitalares. O seu objectivo principal Ă© propor, desenvolver, implementar e avaliar um arquĂ©tipo para uma plataforma de interoperabilidade orientada para o ambiente hospitalar. Este arquĂ©tipo foi validado em diferentes implementaçÔes em instituiçÔes de saĂșde portuguesas de grande dimensĂŁo. Esta plataforma Ă© baseada numa framework de agentes denominada JADE e foi adaptada e orientada para o ambiente hospitalar.. Desta forma o arquĂ©tipo resultante Ă© orientado para resolver as limitaçÔes existentes nas soluçÔes atuais de interoperabilidade hospitalar. Este explora os limites dos comportamentos inteligentes em sistemas multi-agente quando aplicados em procedimentos de interoperabilidade na ĂĄrea da saĂșde para melhorar a fiabilidade e qualidade da informação trocada entre estes sistemas

    Acesso remoto dinùmico e seguro a bases de dados com integração de políticas de acesso suave

    Get PDF
    The amount of data being created and shared has grown greatly in recent years, thanks in part to social media and the growth of smart devices. Managing the storage and processing of this data can give a competitive edge when used to create new services, to enhance targeted advertising, etc. To achieve this, the data must be accessed and processed. When applications that access this data are developed, tools such as Java Database Connectivity, ADO.NET and Hibernate are typically used. However, while these tools aim to bridge the gap between databases and the object-oriented programming paradigm, they focus only on the connectivity issue. This leads to increased development time as developers need to master the access policies to write correct queries. Moreover, when used in database applications within noncontrolled environments, other issues emerge such as database credentials theft; application authentication; authorization and auditing of large groups of new users seeking access to data, potentially with vague requirements; network eavesdropping for data and credential disclosure; impersonating database servers for data modification; application tampering for unrestricted database access and data disclosure; etc. Therefore, an architecture capable of addressing these issues is necessary to build a reliable set of access control solutions to expand and simplify the application scenarios of access control systems. The objective, then, is to secure the remote access to databases, since database applications may be used in hard-to-control environments and physical access to the host machines/network may not be always protected. Furthermore, the authorization process should dynamically grant the appropriate permissions to users that have not been explicitly authorized to handle large groups seeking access to data. This includes scenarios where the definition of the access requirements is difficult due to their vagueness, usually requiring a security expert to authorize each user individually. This is achieved by integrating and auditing soft access policies based on fuzzy set theory in the access control decision-making process. A proof-of-concept of this architecture is provided alongside a functional and performance assessment.A quantidade de dados criados e partilhados tem crescido nos Ășltimos anos, em parte graças Ă s redes sociais e Ă  proliferação dos dispositivos inteligentes. A gestĂŁo do armazenamento e processamento destes dados pode fornecer uma vantagem competitiva quando usados para criar novos serviços, para melhorar a publicidade direcionada, etc. Para atingir este objetivo, os dados devem ser acedidos e processados. Quando as aplicaçÔes que acedem a estes dados sĂŁo desenvolvidos, ferramentas como Java Database Connectivity, ADO.NET e Hibernate sĂŁo normalmente utilizados. No entanto, embora estas ferramentas tenham como objetivo preencher a lacuna entre as bases de dados e o paradigma da programação orientada por objetos, elas concentram-se apenas na questĂŁo da conectividade. Isto aumenta o tempo de desenvolvimento, pois os programadores precisam dominar as polĂ­ticas de acesso para escrever consultas corretas. AlĂ©m disso, quando usado em aplicaçÔes de bases de dados em ambientes nĂŁo controlados, surgem outros problemas, como roubo de credenciais da base de dados; autenticação de aplicaçÔes; autorização e auditoria de grandes grupos de novos utilizadores que procuram acesso aos dados, potencialmente com requisitos vagos; escuta da rede para obtenção de dados e credenciais; personificação de servidores de bases de dados para modificação de dados; manipulação de aplicaçÔes para acesso ilimitado Ă  base de dados e divulgação de dados; etc. Uma arquitetura capaz de resolver esses problemas Ă© necessĂĄria para construir um conjunto confiĂĄvel de soluçÔes de controlo de acesso, para expandir e simplificar os cenĂĄrios de aplicação destes sistemas. O objetivo, entĂŁo, Ă© proteger o acesso remoto a bases de dados, uma vez que as aplicaçÔes de bases de dados podem ser usados em ambientes de difĂ­cil controlo e o acesso fĂ­sico Ă s mĂĄquinas/rede nem sempre estĂĄ protegido. Adicionalmente, o processo de autorização deve conceder dinamicamente as permissĂ”es adequadas aos utilizadores que nĂŁo foram explicitamente autorizados para suportar grupos grandes de utilizadores que procuram aceder aos dados. Isto inclui cenĂĄrios em que a definição dos requisitos de acesso Ă© difĂ­cil devido Ă  sua imprecisĂŁo, geralmente exigindo um especialista em segurança para autorizar cada utilizador individualmente. Este objetivo Ă© atingido no processo de decisĂŁo de controlo de acesso com a integração e auditaria das polĂ­ticas de acesso suaves baseadas na teoria de conjuntos difusos. Uma prova de conceito desta arquitetura Ă© fornecida em conjunto com uma avaliação funcional e de desempenho.Programa Doutoral em InformĂĄtic

    Generation of policy-rich websites from declarative models

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.Includes bibliographical references (p. 89-93).Protecting sensitive data stored behind online websites is a major challenge, but existing techniques are inadequate. Automated website builders typically offer very limited options for specifying custom access policies. Manually adding access policy checks to website code is tedious and error-prone, and it is currently not. feasible to automatically verify that a website conforms to its required access policy. Furthermore, policies change over time, and it can be costly to modify an existing website to reflect the changes or to certify that the modified website still complies with the desired policy. This research presents a declarative modeling approach designed to address these issues, where the data model and the access policy are specified using Alloy, and tile Weballoy tool automatically generates a dynamic website that guarantees the access policy by construction.by Felix Sheng-Ho Chang.Ph.D

    A mobile phone solution for ad-hoc hitch-hiking in South Africa

    Get PDF
    The purpose of this study was to investigate the use of mobile phones in organizing ad-hoc vehicle ridesharing based on hitch-hiking trips involving private car drivers and commuters in South Africa. A study was conducted to learn how hitch-hiking trips are arranged in the urban and rural areas of the Eastern Cape. This involved carrying out interviews with hitch-hikers and participating in several trips. The study results provided the design specifications for a Dynamic Ridesharing System (DRS) tailor-made to the hitch-hiking culture of this context. The design of the DRS considered the delivery of the ad-hoc ridesharing service to the anticipated mobile phones owned by people who use hitch-hiking. The implementation of the system used the available open source solutions and guidelines under the Siyakhula Living Lab project, which promotes the use of Information and Communication Technology (ICT) in marginalized communities of South Africa. The developed prototype was tested in both the simulated and live environments, then followed by usability tests to establish the viability of the system. The results from the tests indicate an initial breakthrough in the process of modernizing the ad-hoc ridesharing of hitch-hiking which is used by a section of people in the urban and rural areas of South Africa
    • 

    corecore