226 research outputs found
Learning environment based on social networks: EPSCCommunity
Today, working in an open and collaborative skills is one of the most demanded in the ICT world to which we are oriented. To this end we believe is essential to have tools and technologies that facilitate and encourage this ability to develop our capabilities in an appropriate manner. The purpose of this project is to design and implement a tool to facilitate group work within the different courses and subjects of the EPSC. The basic idea is to establish a social network formed only by users of the EPSC, which can create groups of subjects managed with by the teacher. This would define different user profiles (student, teacher, guest ...) each having special characteristics and functions different from the others, providing them with more or less depending on the profile permissions. The information would also be subject to different types of view, depending on which users could see a group of a subject, all users ... being a common forum for both general events (demonstrations, lectures, open tables ...) as a way to share information and discoveries while working with your group, as your class or around the world. The initial idea is to implement the use of freeware tools and technologies such as Tomcat, My SQL Server, Spring, Struts, Hibernate, J2ee, jquery-ui, etc,. To conduct a pilot project, and if it works, it could generate a stronger infrastructure in the future
Learning environment based on social networks: EPSCCommunity
Today, working in an open and collaborative skills is one of the most demanded in the ICT world to which we are oriented. To this end we believe is essential to have tools and technologies that facilitate and encourage this ability to develop our capabilities in an appropriate manner. The purpose of this project is to design and implement a tool to facilitate group work within the different courses and subjects of the EPSC. The basic idea is to establish a social network formed only by users of the EPSC, which can create groups of subjects managed with by the teacher. This would define different user profiles (student, teacher, guest ...) each having special characteristics and functions different from the others, providing them with more or less depending on the profile permissions. The information would also be subject to different types of view, depending on which users could see a group of a subject, all users ... being a common forum for both general events (demonstrations, lectures, open tables ...) as a way to share information and discoveries while working with your group, as your class or around the world. The initial idea is to implement the use of freeware tools and technologies such as Tomcat, My SQL Server, Spring, Struts, Hibernate, J2ee, jquery-ui, etc,. To conduct a pilot project, and if it works, it could generate a stronger infrastructure in the future
THE USE OF RECOMMENDER SYSTEMS IN WEB APPLICATIONS â THE TROI CASE
Avoiding digital marketing, surveys, reviews and online users behavior approaches on digital age are the key elements for a powerful businesses to fail, there are some systems that should preceded some artificial intelligence techniques. In this direction, the use of data mining for recommending relevant items as a new state of the art technique is increasing user satisfaction as well as the business revenues. And other related information gathering approaches in order to our systems thing and acts like humans. To do so there is a Recommender System that will be elaborated in this thesis. How people interact, how to calculate accurately and identify what people like or dislike based on their online previous behaviors. The thesis includes also the methodologies recommender system uses, how math equations helps Recommender Systems to calculate userâs behavior and similarities. The filters are important on Recommender System, explaining if similar users like the same product or item, which is the probability of neighbor user to like also. Here comes collaborative filters, neighborhood filters, hybrid recommender system with the use of various algorithms the Recommender Systems has the ability to predict whether a particular user would prefer an item or not, based on the userâs profile and their activities. The use of Recommender Systems are beneficial to both service providers and users. Thesis cover also the strength and weaknesses of Recommender Systems and how involving Ontology can improve it. Ontology-based methods can be used to reduce problems that content-based recommender systems are known to suffer from. Based on Kosovarâs GDP and youngsters job perspectives are desirable for improvements, the demand is greater than the offer. I thought of building an intelligence system that will be making easier for Kosovars to find the appropriate job that suits their profile, skills, knowledge, character and locations. And that system is called TROI Search engine that indexes and merge all local operating job seeking websites in one platform with intelligence features. Thesis will present the design, implementation, testing and evaluation of a TROI search engine. Testing is done by getting user experiments while using running environment of TROI search engine. Results show that the functionality of the recommender system is satisfactory and helpful
Archetype based intelligent system for healthcare interoperability
Tese doutoramento - Programa Doutoral em Engenharia BiomédicaThe healthcare arena configures an environment of both complexity and cooperation, in
which numerous and distinct information systems must exchange information in a expedite
and consolidated manner. Where healthcare interoperability is concerned several techniques,
methodologies, architectures and standards exist. However subjects such as service distribution,
fault tolerance, standards, communication flavoring and tightly-bound systems still are a
major issue of concern.
This work studies and researches the best methodologies to imbue intelligent behaviours
combined with ontology and moral awareness into multi-agents system applied to healthcare
environments. Its core objective is to propose, develop, implement and evaluate an archetype
for an interoperability platform oriented towards the healthcare environment. This archetype
was validated in several implementation in different major healthcare institutions. It is based
in an agent framework named JADE and is adapted and oriented towards the healthcare
environment.
Henceforth the resulting archetype addresses the existing limitations in past and present
solutions regarding healthcare interoperability. It explores the limits of intelligent behaviours
in multi-agent systems applied to interoperation procedures in healthcare, towards the improvement
of the reliability and quality of information exchanged.A ĂĄrea da saĂșde configura um ambiente de grande complexidade e cooperação onde inĂșmeros
e distintos sistemas de informação tĂȘm que trocar informação entre si de uma forma
expedita e consolidada. No ùmbito da interoperabilidade hospitalar existem vårias técnicas,
metodologias, arquiteturas e standards. No entanto, temas como distribuição de serviços, tolerùncia
à falha, standards, flavouring de comunicaçÔes e sistemas fortemente acoplados,
continuam a ser um importante fonte de preocupação.
Este trabalho estuda e pesquiza as melhores metodologias de embeber comportamentos
inteligentes combinados com ontologias e noçÔes morais em sistemas multi-agentes aplicados
a ambientes hospitalares. O seu objectivo principal Ă© propor, desenvolver, implementar e
avaliar um arquétipo para uma plataforma de interoperabilidade orientada para o ambiente
hospitalar. Este arquĂ©tipo foi validado em diferentes implementaçÔes em instituiçÔes de saĂșde
portuguesas de grande dimensĂŁo. Esta plataforma Ă© baseada numa framework de agentes
denominada JADE e foi adaptada e orientada para o ambiente hospitalar..
Desta forma o arquétipo resultante é orientado para resolver as limitaçÔes existentes nas
soluçÔes atuais de interoperabilidade hospitalar. Este explora os limites dos comportamentos
inteligentes em sistemas multi-agente quando aplicados em procedimentos de interoperabilidade
na ĂĄrea da saĂșde para melhorar a fiabilidade e qualidade da informação trocada entre
estes sistemas
Recommended from our members
Research and development of accounting system in grid environment
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The Grid has been recognised as the next-generation distributed computing paradigm by seamlessly integrating heterogeneous resources across administrative domains as a single virtual system. There are an increasing number of scientific and business projects that employ Grid computing technologies for large-scale resource sharing and collaborations. Early adoptions of Grid computing technologies have custom middleware implemented to bridge gaps between heterogeneous computing backbones. These custom solutions form the basis to the emerging Open Grid Service Architecture (OGSA), which aims at addressing common concerns of Grid systems by defining a set of interoperable and reusable Grid services. One of common concerns as defined in OGSA is the Grid accounting service. The main objective of the Grid accounting service is to ensure resources to be shared within a Grid environment in an accountable manner by metering and logging accurate resource usage information. This thesis discusses the origins and fundamentals of Grid computing and accounting service in the context of OGSA profile. A prototype was developed and evaluated based on OGSA accounting-related standards enabling sharing accounting data in a multi-Grid environment, the World-wide Large Hadron Collider Grid (WLCG). Based on this prototype and lessons learned, a generic middleware solution was also implemented as a toolkit that eases migration of existing accounting system to be standard compatible.Engineering and Physical Sciences Research Council (EPSRC), Stanford Universit
Acesso remoto dinĂąmico e seguro a bases de dados com integração de polĂticas de acesso suave
The amount of data being created and shared has grown greatly in recent
years, thanks in part to social media and the growth of smart devices.
Managing the storage and processing of this data can give a competitive edge
when used to create new services, to enhance targeted advertising, etc. To
achieve this, the data must be accessed and processed. When applications
that access this data are developed, tools such as Java Database Connectivity,
ADO.NET and Hibernate are typically used. However, while these tools aim to
bridge the gap between databases and the object-oriented programming
paradigm, they focus only on the connectivity issue. This leads to increased
development time as developers need to master the access policies to write
correct queries. Moreover, when used in database applications within noncontrolled
environments, other issues emerge such as database credentials
theft; application authentication; authorization and auditing of large groups of
new users seeking access to data, potentially with vague requirements;
network eavesdropping for data and credential disclosure; impersonating
database servers for data modification; application tampering for unrestricted
database access and data disclosure; etc.
Therefore, an architecture capable of addressing these issues is necessary to
build a reliable set of access control solutions to expand and simplify the
application scenarios of access control systems. The objective, then, is to
secure the remote access to databases, since database applications may be
used in hard-to-control environments and physical access to the host
machines/network may not be always protected. Furthermore, the authorization
process should dynamically grant the appropriate permissions to users that
have not been explicitly authorized to handle large groups seeking access to
data. This includes scenarios where the definition of the access requirements is
difficult due to their vagueness, usually requiring a security expert to authorize
each user individually. This is achieved by integrating and auditing soft access
policies based on fuzzy set theory in the access control decision-making
process. A proof-of-concept of this architecture is provided alongside a
functional and performance assessment.A quantidade de dados criados e partilhados tem crescido nos Ășltimos anos,
em parte graças às redes sociais e à proliferação dos dispositivos inteligentes.
A gestĂŁo do armazenamento e processamento destes dados pode fornecer
uma vantagem competitiva quando usados para criar novos serviços, para
melhorar a publicidade direcionada, etc. Para atingir este objetivo, os dados
devem ser acedidos e processados. Quando as aplicaçÔes que acedem a
estes dados sĂŁo desenvolvidos, ferramentas como Java Database
Connectivity, ADO.NET e Hibernate sĂŁo normalmente utilizados. No entanto,
embora estas ferramentas tenham como objetivo preencher a lacuna entre as
bases de dados e o paradigma da programação orientada por objetos, elas
concentram-se apenas na questĂŁo da conectividade. Isto aumenta o tempo de
desenvolvimento, pois os programadores precisam dominar as polĂticas de
acesso para escrever consultas corretas. Além disso, quando usado em
aplicaçÔes de bases de dados em ambientes não controlados, surgem outros
problemas, como roubo de credenciais da base de dados; autenticação de
aplicaçÔes; autorização e auditoria de grandes grupos de novos utilizadores
que procuram acesso aos dados, potencialmente com requisitos vagos; escuta
da rede para obtenção de dados e credenciais; personificação de servidores
de bases de dados para modificação de dados; manipulação de aplicaçÔes
para acesso ilimitado à base de dados e divulgação de dados; etc.
Uma arquitetura capaz de resolver esses problemas Ă© necessĂĄria para
construir um conjunto confiåvel de soluçÔes de controlo de acesso, para
expandir e simplificar os cenårios de aplicação destes sistemas. O objetivo,
entĂŁo, Ă© proteger o acesso remoto a bases de dados, uma vez que as
aplicaçÔes de bases de dados podem ser usados em ambientes de difĂcil
controlo e o acesso fĂsico Ă s mĂĄquinas/rede nem sempre estĂĄ protegido.
Adicionalmente, o processo de autorização deve conceder dinamicamente as
permissÔes adequadas aos utilizadores que não foram explicitamente
autorizados para suportar grupos grandes de utilizadores que procuram aceder
aos dados. Isto inclui cenårios em que a definição dos requisitos de acesso é
difĂcil devido Ă sua imprecisĂŁo, geralmente exigindo um especialista em
segurança para autorizar cada utilizador individualmente. Este objetivo é
atingido no processo de decisão de controlo de acesso com a integração e
auditaria das polĂticas de acesso suaves baseadas na teoria de conjuntos
difusos. Uma prova de conceito desta arquitetura Ă© fornecida em conjunto com
uma avaliação funcional e de desempenho.Programa Doutoral em Informåtic
Generation of policy-rich websites from declarative models
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.Includes bibliographical references (p. 89-93).Protecting sensitive data stored behind online websites is a major challenge, but existing techniques are inadequate. Automated website builders typically offer very limited options for specifying custom access policies. Manually adding access policy checks to website code is tedious and error-prone, and it is currently not. feasible to automatically verify that a website conforms to its required access policy. Furthermore, policies change over time, and it can be costly to modify an existing website to reflect the changes or to certify that the modified website still complies with the desired policy. This research presents a declarative modeling approach designed to address these issues, where the data model and the access policy are specified using Alloy, and tile Weballoy tool automatically generates a dynamic website that guarantees the access policy by construction.by Felix Sheng-Ho Chang.Ph.D
A mobile phone solution for ad-hoc hitch-hiking in South Africa
The purpose of this study was to investigate the use of mobile phones in organizing ad-hoc vehicle ridesharing based on hitch-hiking trips involving private car drivers and commuters in South Africa. A study was conducted to learn how hitch-hiking trips are arranged in the urban and rural areas of the Eastern Cape. This involved carrying out interviews with hitch-hikers and participating in several trips. The study results provided the design specifications for a Dynamic Ridesharing System (DRS) tailor-made to the hitch-hiking culture of this context. The design of the DRS considered the delivery of the ad-hoc ridesharing service to the anticipated mobile phones owned by people who use hitch-hiking. The implementation of the system used the available open source solutions and guidelines under the Siyakhula Living Lab project, which promotes the use of Information and Communication Technology (ICT) in marginalized communities of South Africa. The developed prototype was tested in both the simulated and live environments, then followed by usability tests to establish the viability of the system. The results from the tests indicate an initial breakthrough in the process of modernizing the ad-hoc ridesharing of hitch-hiking which is used by a section of people in the urban and rural areas of South Africa
- âŠ