76 research outputs found
Minimum Competency Assessment Design to Improve Mathematical Literacy in Junior High Schools
Mathematical literacy ability is important in the process of learning mathematics at schools. Efforts to improve mathematical literacy skills mostly involve providing materials and integrating learning with an ethnomathematical approach and higherorder thinking skills (HOTs) related to real life. The minimum competency assessment (AKM) is one of the ways to photograph students’ numeracy skills so that students can face and understand the flow of information. This study aims to design AKM tools for junior high school students in the city of Semarang, with a focus on mathematics. The study included the administrators of the association of mathematics teachers and all junior high school mathematics teachers in the city of Semarang. A large-scale focus-group discussion was created. The results show that the AKM design has a positive influence on teachers. Since teachers receive contextual information more quickly, the form of AKM questions becomes up to date. Students, on the other hand, are happy as the questions are presented in the form of stories. Thus, students’ mathematics learning ability increases, this is indicated by students being able to understand information from AKM questions.
Keywords: mathematical literacy, minimum competency assessment, HOT
Efficient distribution of a computation intensive calculation on an Android device to external compute units with an Android API
Is transferring computation intensive calculations to external compute-units the next trend? This master’s thesis researches if it is worth the effort to transfer a matrix multiplication from an Android phone to a System-on-Chip (SoC), using Bluetooth or WebSocket as communication protocols. The SoC solution used in this work is an Intel Altera Cyclone V based board from TerASIC, equipped with a Field Programmable Gate Array (FPGA) including a Dualcore ARM A9 processor. Because the matrix size has a strong correlation to the number of calculations in a matrix multiplication, the calculation time on a CPU and FPGA will differ when the matrices grow in size. Comparing the multiplication times on Android and SoC, matrices with a matrix size above 1660x1660 are calculated faster on the SoC.
The matrix multiplication is accelerated using an OpenCL kernel on the FPGA, guided by a host program on the processor programmed in C++.
Experiments have shown that Bluetooth has a 500 times lower transfer rate than WebSocket, resulting in choosing only WebSocket for further investigations. Due to the transfer times, the minimum matrix size to win time by extending the multiplication to a SoC is 2338x2338. Although the implemented matrix multiplication does only support square matrices, future research could develop multiple kernels of different algorithms that support a variation in width and height
An Approach to Guide Users Towards Less Revealing Internet Browsers
When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed
Introductory Computer Forensics
INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic
Systematic Approaches for Telemedicine and Data Coordination for COVID-19 in Baja California, Mexico
Conference proceedings info:
ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologies
Raleigh, HI, United States, March 24-26, 2023
Pages 529-542We provide a model for systematic implementation of telemedicine within a large evaluation center for COVID-19 in the area of Baja California, Mexico. Our model is based on human-centric design factors and cross disciplinary collaborations for scalable data-driven enablement of smartphone, cellular, and video Teleconsul-tation technologies to link hospitals, clinics, and emergency medical services for point-of-care assessments of COVID testing, and for subsequent treatment and quar-antine decisions. A multidisciplinary team was rapidly created, in cooperation with different institutions, including: the Autonomous University of Baja California, the Ministry of Health, the Command, Communication and Computer Control Center
of the Ministry of the State of Baja California (C4), Colleges of Medicine, and the College of Psychologists. Our objective is to provide information to the public and to evaluate COVID-19 in real time and to track, regional, municipal, and state-wide data in real time that informs supply chains and resource allocation with the anticipation of a surge in COVID-19 cases. RESUMEN Proporcionamos un modelo para la implementación sistemática de la telemedicina dentro de un gran centro de evaluación de COVID-19 en el área de Baja California, México. Nuestro modelo se basa en factores de diseño centrados en el ser humano y colaboraciones interdisciplinarias para la habilitación escalable basada en datos de tecnologÃas de teleconsulta de teléfonos inteligentes, celulares y video para vincular hospitales, clÃnicas y servicios médicos de emergencia para evaluaciones de COVID en el punto de atención. pruebas, y para el tratamiento posterior y decisiones de cuarentena. Rápidamente se creó un equipo multidisciplinario, en cooperación con diferentes instituciones, entre ellas: la Universidad Autónoma de Baja California, la SecretarÃa de Salud, el Centro de Comando, Comunicaciones y Control Informático.
de la SecretarÃa del Estado de Baja California (C4), Facultades de Medicina y Colegio de Psicólogos. Nuestro objetivo es proporcionar información al público y evaluar COVID-19 en tiempo real y rastrear datos regionales, municipales y estatales en tiempo real que informan las cadenas de suministro y la asignación de recursos con la anticipación de un aumento de COVID-19. 19 casos.ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologieshttps://doi.org/10.1007/978-981-99-3236-
Fundamental Approaches to Software Engineering
computer software maintenance; computer software selection and evaluation; formal logic; formal methods; formal specification; programming languages; semantics; software engineering; specifications; verificatio
Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which
the attacked software runs, and try to break the confidentiality or integrity
of assets embedded in the software. Both companies and malware authors want to
prevent such attacks. This has driven an arms race between attackers and
defenders, resulting in a plethora of different protection and analysis
methods. However, it remains difficult to measure the strength of protections
because MATE attackers can reach their goals in many different ways and a
universally accepted evaluation methodology does not exist. This survey
systematically reviews the evaluation methodologies of papers on obfuscation, a
major class of protections against MATE attacks. For 572 papers, we collected
113 aspects of their evaluation methodologies, ranging from sample set types
and sizes, over sample treatment, to performed measurements. We provide
detailed insights into how the academic state of the art evaluates both the
protections and analyses thereon. In summary, there is a clear need for better
evaluation methodologies. We identify nine challenges for software protection
evaluations, which represent threats to the validity, reproducibility, and
interpretation of research results in the context of MATE attacks
The platform as ecosystem: Configurations and dynamics of governance and power
Digital ‘platforms’ owned and operated by powerful Big Tech companies have shaped and impacted social, economic, and political life in significant ways. Yet, platforms remain an ambiguous phenomenon. What exactly are these platforms? How can we identify and understand the features of their power? The platform as ecosystem explains how not merely the platforms themselves but especially their larger ‘ecosystems’ are important for understanding the unique features of platform governance and power. Platform ecosystems have become the dominant technological, organisational, and governance model for digital platforms over the past fifteen years. These ecosystems comprise many different types of users including end-consumers, software developers, marketers and advertisers, and business partners who build software tools, products, and services of their own ‘on top’ of the interfaces provided and controlled by leading platforms. These users each help build and expand platform ecosystems while negotiating governance and control by central platforms. This dissertation examines different aspects of platform ecosystems to determine how platforms’ material foundations or infrastructures relate to governance and power. It develops several novel empirical and historical approaches for studying the distinct material and relational features of digital platform ecosystems. This reveals how platforms derive considerable power from their ecosystems and provides unique empirical and historical insights into the technological, organisational, and evolutionary features of platform (and mobile app) ecosystems. These approaches and insights are relevant to digital media and platform researchers and help policymakers, regulators, and authorities worldwide dealing with the challenges of governing digital economies and societies
Trinity College Bulletin, 2013-2014 (Catalogue)
https://digitalrepository.trincoll.edu/bulletin/1480/thumbnail.jp
Trinity College Bulletin, 2012-2013 (Catalogue)
https://digitalrepository.trincoll.edu/bulletin/1479/thumbnail.jp
- …