76 research outputs found

    Minimum Competency Assessment Design to Improve Mathematical Literacy in Junior High Schools

    Get PDF
    Mathematical literacy ability is important in the process of learning mathematics at schools. Efforts to improve mathematical literacy skills mostly involve providing materials and integrating learning with an ethnomathematical approach and higherorder thinking skills (HOTs) related to real life. The minimum competency assessment (AKM) is one of the ways to photograph students’ numeracy skills so that students can face and understand the flow of information. This study aims to design AKM tools for junior high school students in the city of Semarang, with a focus on mathematics. The study included the administrators of the association of mathematics teachers and all junior high school mathematics teachers in the city of Semarang. A large-scale focus-group discussion was created. The results show that the AKM design has a positive influence on teachers. Since teachers receive contextual information more quickly, the form of AKM questions becomes up to date. Students, on the other hand, are happy as the questions are presented in the form of stories. Thus, students’ mathematics learning ability increases, this is indicated by students being able to understand information from AKM questions. Keywords: mathematical literacy, minimum competency assessment, HOT

    Efficient distribution of a computation intensive calculation on an Android device to external compute units with an Android API

    Get PDF
    Is transferring computation intensive calculations to external compute-units the next trend? This master’s thesis researches if it is worth the effort to transfer a matrix multiplication from an Android phone to a System-on-Chip (SoC), using Bluetooth or WebSocket as communication protocols. The SoC solution used in this work is an Intel Altera Cyclone V based board from TerASIC, equipped with a Field Programmable Gate Array (FPGA) including a Dualcore ARM A9 processor. Because the matrix size has a strong correlation to the number of calculations in a matrix multiplication, the calculation time on a CPU and FPGA will differ when the matrices grow in size. Comparing the multiplication times on Android and SoC, matrices with a matrix size above 1660x1660 are calculated faster on the SoC. The matrix multiplication is accelerated using an OpenCL kernel on the FPGA, guided by a host program on the processor programmed in C++. Experiments have shown that Bluetooth has a 500 times lower transfer rate than WebSocket, resulting in choosing only WebSocket for further investigations. Due to the transfer times, the minimum matrix size to win time by extending the multiplication to a SoC is 2338x2338. Although the implemented matrix multiplication does only support square matrices, future research could develop multiple kernels of different algorithms that support a variation in width and height

    An Approach to Guide Users Towards Less Revealing Internet Browsers

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed

    Introductory Computer Forensics

    Get PDF
    INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic

    Systematic Approaches for Telemedicine and Data Coordination for COVID-19 in Baja California, Mexico

    Get PDF
    Conference proceedings info: ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologies Raleigh, HI, United States, March 24-26, 2023 Pages 529-542We provide a model for systematic implementation of telemedicine within a large evaluation center for COVID-19 in the area of Baja California, Mexico. Our model is based on human-centric design factors and cross disciplinary collaborations for scalable data-driven enablement of smartphone, cellular, and video Teleconsul-tation technologies to link hospitals, clinics, and emergency medical services for point-of-care assessments of COVID testing, and for subsequent treatment and quar-antine decisions. A multidisciplinary team was rapidly created, in cooperation with different institutions, including: the Autonomous University of Baja California, the Ministry of Health, the Command, Communication and Computer Control Center of the Ministry of the State of Baja California (C4), Colleges of Medicine, and the College of Psychologists. Our objective is to provide information to the public and to evaluate COVID-19 in real time and to track, regional, municipal, and state-wide data in real time that informs supply chains and resource allocation with the anticipation of a surge in COVID-19 cases. RESUMEN Proporcionamos un modelo para la implementación sistemática de la telemedicina dentro de un gran centro de evaluación de COVID-19 en el área de Baja California, México. Nuestro modelo se basa en factores de diseño centrados en el ser humano y colaboraciones interdisciplinarias para la habilitación escalable basada en datos de tecnologías de teleconsulta de teléfonos inteligentes, celulares y video para vincular hospitales, clínicas y servicios médicos de emergencia para evaluaciones de COVID en el punto de atención. pruebas, y para el tratamiento posterior y decisiones de cuarentena. Rápidamente se creó un equipo multidisciplinario, en cooperación con diferentes instituciones, entre ellas: la Universidad Autónoma de Baja California, la Secretaría de Salud, el Centro de Comando, Comunicaciones y Control Informático. de la Secretaría del Estado de Baja California (C4), Facultades de Medicina y Colegio de Psicólogos. Nuestro objetivo es proporcionar información al público y evaluar COVID-19 en tiempo real y rastrear datos regionales, municipales y estatales en tiempo real que informan las cadenas de suministro y la asignación de recursos con la anticipación de un aumento de COVID-19. 19 casos.ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologieshttps://doi.org/10.1007/978-981-99-3236-

    Fundamental Approaches to Software Engineering

    Get PDF
    computer software maintenance; computer software selection and evaluation; formal logic; formal methods; formal specification; programming languages; semantics; software engineering; specifications; verificatio

    Evaluation Methodologies in Software Protection Research

    Full text link
    Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attacks. This has driven an arms race between attackers and defenders, resulting in a plethora of different protection and analysis methods. However, it remains difficult to measure the strength of protections because MATE attackers can reach their goals in many different ways and a universally accepted evaluation methodology does not exist. This survey systematically reviews the evaluation methodologies of papers on obfuscation, a major class of protections against MATE attacks. For 572 papers, we collected 113 aspects of their evaluation methodologies, ranging from sample set types and sizes, over sample treatment, to performed measurements. We provide detailed insights into how the academic state of the art evaluates both the protections and analyses thereon. In summary, there is a clear need for better evaluation methodologies. We identify nine challenges for software protection evaluations, which represent threats to the validity, reproducibility, and interpretation of research results in the context of MATE attacks

    The platform as ecosystem: Configurations and dynamics of governance and power

    Get PDF
    Digital ‘platforms’ owned and operated by powerful Big Tech companies have shaped and impacted social, economic, and political life in significant ways. Yet, platforms remain an ambiguous phenomenon. What exactly are these platforms? How can we identify and understand the features of their power? The platform as ecosystem explains how not merely the platforms themselves but especially their larger ‘ecosystems’ are important for understanding the unique features of platform governance and power. Platform ecosystems have become the dominant technological, organisational, and governance model for digital platforms over the past fifteen years. These ecosystems comprise many different types of users including end-consumers, software developers, marketers and advertisers, and business partners who build software tools, products, and services of their own ‘on top’ of the interfaces provided and controlled by leading platforms. These users each help build and expand platform ecosystems while negotiating governance and control by central platforms. This dissertation examines different aspects of platform ecosystems to determine how platforms’ material foundations or infrastructures relate to governance and power. It develops several novel empirical and historical approaches for studying the distinct material and relational features of digital platform ecosystems. This reveals how platforms derive considerable power from their ecosystems and provides unique empirical and historical insights into the technological, organisational, and evolutionary features of platform (and mobile app) ecosystems. These approaches and insights are relevant to digital media and platform researchers and help policymakers, regulators, and authorities worldwide dealing with the challenges of governing digital economies and societies

    Trinity College Bulletin, 2013-2014 (Catalogue)

    Get PDF
    https://digitalrepository.trincoll.edu/bulletin/1480/thumbnail.jp

    Trinity College Bulletin, 2012-2013 (Catalogue)

    Get PDF
    https://digitalrepository.trincoll.edu/bulletin/1479/thumbnail.jp
    • …
    corecore