21,728 research outputs found
Building and Executing MOOCs: A Practical Review of Glasgow's First Two MOOCs (Massive Open Online Courses)
No abstract available
Open source in libraries: Implementation of an open source ILMS at Asia e-University library
Open source systems for libraries have improved significantly to gain the confidence of librarians. The main focus of the paper is to describe the selection process and criteria that led to the implementation of Koha the first open source Integrated Library Management System at the AeU Library. A study was made based on the set criteria used to compare and contrast with the more popular propriety library management systems. The paper presents the findings of the study which led to the selection of Koha, and a brief introduction to features of open source systems for libraries. The reasoning and conditions for accepting Koha are discussed. A brief account of the implementation process and related experience of the open source ILMS are given. AeU library implemented the various modules of the system: cataloging, online public access (OPAC), circulation, patron management and acquisitions. The expanding influence and acceptance of OSS in libraries is here to stay. Malaysian libraries may need to look into the credible options and benefits of utilizing open source systems and harness this development in ILS
Evading Classifiers by Morphing in the Dark
Learning-based systems have been shown to be vulnerable to evasion through
adversarial data manipulation. These attacks have been studied under
assumptions that the adversary has certain knowledge of either the target model
internals, its training dataset or at least classification scores it assigns to
input samples. In this paper, we investigate a much more constrained and
realistic attack scenario wherein the target classifier is minimally exposed to
the adversary, revealing on its final classification decision (e.g., reject or
accept an input sample). Moreover, the adversary can only manipulate malicious
samples using a blackbox morpher. That is, the adversary has to evade the
target classifier by morphing malicious samples "in the dark". We present a
scoring mechanism that can assign a real-value score which reflects evasion
progress to each sample based on the limited information available. Leveraging
on such scoring mechanism, we propose an evasion method -- EvadeHC -- and
evaluate it against two PDF malware detectors, namely PDFRate and Hidost. The
experimental evaluation demonstrates that the proposed evasion attacks are
effective, attaining evasion rate on the evaluation dataset.
Interestingly, EvadeHC outperforms the known classifier evasion technique that
operates based on classification scores output by the classifiers. Although our
evaluations are conducted on PDF malware classifier, the proposed approaches
are domain-agnostic and is of wider application to other learning-based
systems
A gentle transition from Java programming to Web Services using XML-RPC
Exposing students to leading edge vocational areas of relevance such as Web Services can be difficult. We show a lightweight approach by embedding a key component of Web Services within a Level 3 BSc module in Distributed Computing. We present a ready to use collection of lecture slides and student activities based on XML-RPC. In
addition we show that this material addresses the central topics in the context of web services as identified by Draganova (2003)
Twitter and non-elites. Interpreting power dynamics in the life story of the (#)BRCA Twitter stream
In May 2013 and March 2015, actress Angelina Jolie wrote in the New York Times about her choice to undergo preventive surgery. In her two op-eds she explained that - as a carrier of the BRCA1 gene mutation - preventive surgery was the best way to lower her heightened risk of developing breast and ovarian cancer. By applying a digital methods approach to BRCA-related tweets from 2013 and 2015, before, during and after the exposure of Jolieās story, this study maps and interprets Twitter discursive dynamics at two time points of the BRCA Twitter stream. Findings show an evolution in curation and framing dynamics occurring between 2013 and 2015, with individual patient advocates replacing advocacy organisations as top curators of BRCA content and coming to prominence as providers of specialist illness narratives. These results suggest that between 2013 and 2015, Twitter went from functioning primarily as an organisation-centred news reporting mechanism, to working as a crowdsourced specialist awareness system. This paper advances a twofold contribution. First, it points at Twitterās fluid functionality for an issue public and suggests that by looking at the life story ā rather than at a single time point ā of an issue-based Twitter stream we can track the evolution of power roles underlying discursive practices and better interpret the emergence of non-elite actors in the public arena. Second, the study provides evidence of the rise of activist cultures that rely on fluid, non-elite, collective and individual social media engagement
- ā¦