5,549 research outputs found

    Mobile Learning Applications Audit

    Get PDF
    While mobile learning (m-learning) applications have proven their value in educational activities, there is a need to measure their reliability, accessibility and further more their trustworthiness. Mobile devices are far more vulnerable then classic computers and present inconvenient interfaces due to their size, hardware limitations and their mobile connectivity. Mobile learning applications should be audited to determine if they should be trusted or not, while multimedia contents like automatic speech recognition (ASR) can improve their accessibility. This article will start with a brief introduction on m-learning applications, then it will present the audit process for m-learning applications, it will iterate their specific security threats, it will define the ASR process, and it will elaborate how ASR can enhance accessibility of these types of applications.IT Audit, Software Testing, Penetration Testing, Mobile Applications, Multimedia, Automatic Speech Recognition

    New Method for Optimization of License Plate Recognition system with Use of Edge Detection and Connected Component

    Full text link
    License Plate recognition plays an important role on the traffic monitoring and parking management systems. In this paper, a fast and real time method has been proposed which has an appropriate application to find tilt and poor quality plates. In the proposed method, at the beginning, the image is converted into binary mode using adaptive threshold. Then, by using some edge detection and morphology operations, plate number location has been specified. Finally, if the plat has tilt, its tilt is removed away. This method has been tested on another paper data set that has different images of the background, considering distance, and angel of view so that the correct extraction rate of plate reached at 98.66%.Comment: 3rd IEEE International Conference on Computer and Knowledge Engineering (ICCKE 2013), October 31 & November 1, 2013, Ferdowsi Universit Mashha

    Mobile Learning Applications Audit

    Get PDF
    While mobile learning (m-learning) applications have proven their value in educational activities, there is a need to measure their reliability, accessibility and further more their trustworthiness. Mobile devices are far more vulnerable then classic computers and present inconvenient interfaces due to their size, hardware limitations and their mobile connectivity. Mobile learning applications should be audited to determine if they should be trusted or not, while multimedia contents like automatic speech recognition (ASR) can improve their accessibility. This article will start with a brief introduction on m-learning applications, then it will present the audit process for m-learning applications, it will iterate their specific security threats, it will define the ASR process, and it will elaborate how ASR can enhance accessibility of these types of applications

    Scenario driven requirement engineering for design and deployment of mobile communication networks

    Get PDF
    The numbers of users and usage of mobile data service are increasing dramatically due to the introduction of smartphones and mobile broadband dongles. For the next decade the mobile broadband market is expected to grow and reach a level where the average data consumption per user is orders of magnitude greater than today. For the telecom industry it is a magnificent challenge to design and deploy these s high-capacity wireless networks taking into account limitations in cost, energy and radio spectrum. The objective of this paper is to highlight the need to consider a multitude of scenarios for the requirements, design and deployment of mobile broad band networks. The R&D has for many years been targeting high peak data rates enabled by improved spectral efficiency, adding more spectrum bands, aggregation of frequency bands and offloading to local wireless networks connected via public fixed phones or broadband. However, many of these features driving the technology development are representative for the conditions in US and Western Europe. The wireless networks also need to be designed assuming deployment in regions in the world where both the availability of spectrum as well as the penetration of fixed phones and broadband are limited. --Mobile broadband networks,cost and capacity,spectrum,deployment strategies,telecommunications,management of technology and R&D,economic development of natural resources

    A Review of the Open Educational Resources (OER) Movement: Achievements, Challenges, and New Opportunities

    Get PDF
    Examines the state of the foundation's efforts to improve educational opportunities worldwide through universal access to and use of high-quality academic content
    • 

    corecore