1,135 research outputs found

    Levittown Union Free School District and Levittown United Teachers (2008)

    Get PDF

    Quality assessment technique for ubiquitous software and middleware

    Get PDF
    The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than building quality assurance indices or guidelines. In this context, measuring quality is the key to developing high-quality ubiquitous computing products. For this reason, various quality models have been defined, adopted and enhanced over the years, for example, the need for one recognised standard quality model (ISO/IEC 9126) is the result of a consensus for a software quality model on three levels: characteristics, sub-characteristics, and metrics. However, it is very much unlikely that this scheme will be directly applicable to ubiquitous computing environments which are considerably different to conventional software, trailing a big concern which is being given to reformulate existing methods, and especially to elaborate new assessment techniques for ubiquitous computing environments. This paper selects appropriate quality characteristics for the ubiquitous computing environment, which can be used as the quality target for both ubiquitous computing product evaluation processes ad development processes. Further, each of the quality characteristics has been expanded with evaluation questions and metrics, in some cases with measures. In addition, this quality model has been applied to the industrial setting of the ubiquitous computing environment. These have revealed that while the approach was sound, there are some parts to be more developed in the future

    The Bridge Newsletter Winter 2019

    Get PDF
    -Dehghani joins S&T-Life after death of solar panels-Civil engineering senior studies in Hong Kong-Planning for future climate changes in the Artichttps://scholarsmine.mst.edu/bridge/1016/thumbnail.jp

    Adjoining Internet of Things with Data Mining : A Survey

    Get PDF
    The Interactive Data Corporative (IDC) conjectures that by 2025 the worldwide data circle will develop to 163ZB (that is a trillion gigabytes) which is ten times the 16.1ZB of information produced in 2016. The Internet of Things is one of the hot topics of this living century and researchers are heading for mass adoption 2019 driven by better than-expected business results. This information will open one of a kind of user experience and another universe of business opening. The huge information produced by the Internet of Things (IoT) are considered of high business esteem, and information mining calculations can be connected to IoT to extract hidden data from information. This paper concisely discusses the work done in sequential manner of time in different fields of IOT along with its outcome and research gap. This paper also discusses the various aspects of data mining functionalities with IOT. The recommendation for the Challenges in IOT that can be adopted for betterment is given. Finally, this paper presents the vision for how IOT will have impact on changing the distant futur

    Philosophy and Structure of a CWE-based Model of Building Design.

    Get PDF
    Building industry involves a far greater number of professional profiles than all other industries, and it wastes about half of world energy consumption: these two figures are already indicative of the economical importance of this sector beyond all the technical and environmental implications. Anyhow, while the complexity of the building process and of its products is ever increasing, the quality of the buildings is often inadequate, as not complying with the required performances, budget and timing . These difficulties, generally all the greater the more ‘creative’ the design, are often aggravated by misunderstandings, lack of data, and the different aims pursued by the various actors, owing to the close links that exist between actors, activities and resources. To overcome these difficulties we propose a CWE-based process/product model (and an underlying formalization of the information exchanged) of an ICT system through which numerous actors exchange knowledge and interact in carrying out consistent solutions of a design project

    The THOMAS architecture in Home Care scenarios: A case study

    Get PDF
    Today, the need for architectures and computational models for large scale open multi-agent systems is considered a key issue for the success of agent technology in real world scenarios. The main goal of this paper is to describe a case study in Home Care scenarios applying an abstract architecture and a computational model for large scale open multi-agent systems based on a service-oriented approach. The architecture used is THOMAS, which specifically addresses the design of Home Care systems. This paper presents services examples for the management of a dependent home environment, and demonstrates the new features of the proposal

    A STUDY ON THE APPLICATION OF "MOBILE MICRO-WRITING + AUTOMATIC CORRECTION + ENGLISH WECHAT" MODEL IN THE INSTRUCTION OF COLLEGE ENGLISH WRITING IN CHINA

    Get PDF
    In order to change the problems of low teaching efficiency and slow development of students' writing ability in the course of College English Writing in China, this paper puts forward a teaching model of "mobile micro-writing + automatic correction + English WeChat", and conducted a 32-class-hour instructional reform experiment in 16 weeks to two classes of sophomores majoring in English. The results show that more than 90% of the students in the experimental class support the teaching model, and their interest in English writing, self-awareness of writing and English writing ability have been significantly improved, especially their average score of English writing has increased by 25.51%. Furthermore, they have significant advantages over the control class in writing time, word number, composition score, writing length, vocabulary use, sentence length, and so on. In the meantime, this study analyzes the existing problems of the intelligent correction system, which provides a reference for the non-English speaking countries' English writing teaching.  Article visualizations

    E-CRM and CMS systems: potential for more dynamic businesses

    Get PDF
    Any change in customer’s behaviour affects the customer’s value. In addition, profitability and economic viability also change. Most companies still do not know entirely their customer base characteristics. They find difficult to define criteria that segment their customer base to find high-value customers. They need to focus on target selections to carry on with marketing campaigns which involve high investments. Given the potential of e-CRM and CMS as powerful tools to guide customer-oriented understanding and analysis, greater attention is required. Several companies, operating within the same business and having access to the same information and technology, differ in e-CRM performance. Without sufficient evidence, managers are prone to making investment decisions that are neither efficient nor effective. So it is imperative to base the decision of e-CRM and CMS adoption, on not only their analytical power, but also on economic viability criteria for sustainable business dynamic

    Protected Users: A Moodle Plugin To Improve Confidentiality and Privacy Support through User Aliases

    Get PDF
    [EN]The privacy policies, terms, and conditions of use in any Learning Management System (LMS) are one-way contracts. The institution imposes clauses that the student can accept or decline. Students, once they accept conditions, should be able to exercise the rights granted by the General Data Protection Regulation (GDPR). However, students cannot object to data processing and public profiling because it would be conceived as an impediment to teachers to execute their work with normality. Nonetheless, regarding GDPR and consulted legal advisors, a student could claim identity anonymization in the LMS, if adequate personal justifications are provided. Per contra, the current LMSs do not have any functionality that enables identity anonymization. This is a big problem that generates undesired situations which urgently requires a definitive solution. In this work, we surveyed students and teachers to validate the feasibility and acceptance of using aliases to anonymize their identity in LMSs as a sustainable solution to the problem. Considering the positive results, we developed a user-friendly plugin for Moodle that enables students' identity anonymization by the use of aliases. This plugin, presented in this work and named Protected users, is publicly available online at GitHub and published under GNU General Public License
    • 

    corecore