129,118 research outputs found

    MSUO Information Technology and Geographical Information Systems: Common Protocols & Procedures. Report to the Marine Safety Umbrella Operation

    Get PDF
    The Marine Safety Umbrella Operation (MSUO) facilitates the cooperation between Interreg funded Marine Safety Projects and maritime stakeholders. The main aim of MSUO is to permit efficient operation of new projects through Project Cooperation Initiatives, these include the review of the common protocols and procedures for Information Technology (IT) and Geographical Information Systems (GIS). This study carried out by CSA Group and the National Centre for Geocomputation (NCG) reviews current spatial information standards in Europe and the data management methodologies associated with different marine safety projects. International best practice was reviewed based on the combined experience of spatial data research at NCG and initiatives in the US, Canada and the UK relating to marine security service information and acquisition and integration of large marine datasets for ocean management purposes. This report identifies the most appropriate international data management practices that could be adopted for future MSUO projects

    XBRL:The Views of Stakeholders

    Get PDF

    Unified Description for Network Information Hiding Methods

    Full text link
    Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe the embedding of hidden information. We introduce the first unified description of hiding methods in network steganography. Our description method is based on a comprehensive analysis of the existing publications in the domain. When our description method is applied by the research community, future publications will be easier to categorize, compare and extend. Our method can also serve as a basis to evaluate the novelty of hiding methods proposed in the future.Comment: 24 pages, 7 figures, 1 table; currently under revie

    Implementing Open Access Policy: First case studies

    Get PDF
    When implementing open access, policy pioneers and flagship institutions alike have faced considerable challenges in meeting their own aims and achieving a recognized success. Legitimate authority, sufficient resources and the right timing are crucial, but the professionals charged with implementing policy still need several years to accomplish significant progress. This study defines a methodological standard for evaluating the first generation of open access policies. Evaluating implementation establishes evidence, enables reflection, and may foster the emergence of a second generation of open access policies. While the study is based on a small number of cases, these case studies cover most of the pioneer institutions, present the most significant issues and offer an international overview. Each case is reconstructed individually on the basis of public documents and background information, and supported by interviews with professionals responsible for open access implementation. This article presents the highlights from each case study. The results are utilized to indicate how a second generation of policies might define open access as a key component of digital research infrastructures that provide inputs and outputs for research, teaching and learning in real time.</p

    Reflections on security options for the real-time transport protocol framework

    Get PDF
    The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video ap- plications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications. This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the level of the media transport protocol

    A case study for measuring informal learning in PLEs

    Get PDF
    The technological support for learning and teaching processes is constantly changing. Information and Communication Technologies (ICT) applied to education, cause changes that affect the way in which people learn. This application introduces new software systems and solutions to carry out teaching and learning activities. Connected to ICT application, the emergence of Web 2.0 and its use in learning contexts enables an online implementation of the student-centred learning paradigm. In addition, 2.0 trends provide “new” ways to exchange, making easier for informal learning to become patent. Given this context, open and user-centered learning environments are needed to integrate such kinds of tools and trends and are commonly described as Personal Learning Environments. Such environments coexist with the institutional learning management systems and they should interact and exchange information between them. This interaction would allow the assessment of what happens in the personal environment from the institutional side. This article describes a solution to make the interoperability possible between these systems. It is based on a set of interoperability scenarios and some components and communication channels. In order to test the solution it is implemented as a proof of concept and the scenarios are validated through several pilot experiences. In this article one of such scenarios and its evaluation experiment is described to conclude that functionalities from the institutional environments and the personal ones can be combined and it is possible to assess what happens in the activities based on them.Peer ReviewedPostprint (published version
    • 

    corecore