14,575 research outputs found

    Supporting organisational learning: an overview of the ENRICH approach

    Get PDF
    Traditional training separates learning from the work context in which the newly acquired knowledge is to be applied. This requires the worker themselves to apply imparted theoretical knowledge to knowledge in practice, a process that is grossly inefficient. The ENRICH approach builds on organisational learning theory to intertwine working and learning. The ENRICH methodology incorporates theories of learning at the individual, group and organisational level. Individual level learning is supported through the provision of semantically related resources to support problem reframing and to challenge assumptions. Group learning is supported through the evolution of domain concepts through work documents and representations linked to formal models of group knowledge, and the development of group practices and perspectives through enhanced sharing and collaboration. Organisational learning is supported through exposure to customs and conventions of other groups through shared best practices and knowledge models. The approach is being investigated in a range of industrial settings and applications

    Phishing e-mail filtering mechanism using heuristic technique

    Get PDF
    Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides’ Web site. In this research paper, I proposed a novel method to phishing email filtering by the use of end-host based anti-phishing algorithm, which is call Link Guard and content based filtering by the use of knowledge discovery by utilizing the generic characteristics of the hyperlinks in phishing attacks. These characteristics are derived by analyzing the phishing data archive provided by the Anti-Phishing Working Group (APWG). Because it is based on the generic characteristics of phishing attacks, Link Guard can detect not only known but also unknown phishing attacks. Our experimental analysis verified that Link Guard is effective to detect and prevent both known and unknown phishing attacks with minimal false negatives. This research also showed that Link Guard is light weighted and can detect and prevent phishing attacks in real time

    Multimodal music information processing and retrieval: survey and future challenges

    Full text link
    Towards improving the performance in various music information processing tasks, recent studies exploit different modalities able to capture diverse aspects of music. Such modalities include audio recordings, symbolic music scores, mid-level representations, motion, and gestural data, video recordings, editorial or cultural tags, lyrics and album cover arts. This paper critically reviews the various approaches adopted in Music Information Processing and Retrieval and highlights how multimodal algorithms can help Music Computing applications. First, we categorize the related literature based on the application they address. Subsequently, we analyze existing information fusion approaches, and we conclude with the set of challenges that Music Information Retrieval and Sound and Music Computing research communities should focus in the next years

    Organization and Usage of Learning Objects within Personal Computers

    Get PDF
    Research report of the ProLearn Network of Excellence (IST 507310), Deliverable 7.6To promote the integration of Desktop related Knowledge Management and Technology Enhanced Learning this deliverable aims at increasing the awareness of Desktop research within the Professional Learning community and at familiarizing the e-Learning researchers with the state-of-the-art in the relevant areas of Personal Information Management (PIM), as well as with the currently on-going activities and some of the regular PIM publication venues
    corecore