260 research outputs found

    Design And Development of Online Admission System For Alquds Open University in Palestine

    Get PDF
    Student admissions are playing very important role in major activities of the any university as the basic requirement of the university is students and without students university cannot survive. An inefficient admission application system may reduce the number of admitted student in the esteemed university because if the admission system is slow and having many delays in the process. When considering Palestine students this is unfortunate, but when considering Palestinian international students it can mean the difference between success and failure because of the large sums of money each brings to the university’s economy. This project is to design and develop the under-graduate Palestinian international and local admission process at the University of Alquds Open University to develop an easy to use system that will significantly quicken and simplify this process. The interviews were conducted for the data collection, after that the design was made in UML for meeting the requirement of admission system. This admission system was developed by using JSP and MySQL. The system usefulness, quality of information and quality of interface were evaluated by distributing questionnaire to users and analysis on the data collected from questionnaire was analyzed by using SPSS software

    Tracking sub-page components in document workflows

    Get PDF
    Documents go through numerous transformations and intermediate formats as they are processed from abstract markup into final printable form. This notion of a document workflow is well established but it is common to find that ideas about document components, which might exist in the source code for the document, become completely lost within an amorphous, unstructured, page of PDF prior to being rendered. Given the importance of a component-based approach in Variable Data Printing (VDP) we have developed a collection of tools that allow information about the various transformations to be embedded at each stage in the workflow, together with a visualization tool that uses this embedded information to display the relationships between the various intermediate documents. In this paper, we demonstrate these tools in the context of an example document workflow but the techniques described are widely applicable and would be easily adaptable to other workflows and for use in teaching tools to illustrate document component and VDP concepts

    Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, and Copyright/Intellectual Property

    Get PDF
    Key Messages Background Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual property rights and protection are of key importance for organizational and individual success in an evolving society and labour market in which information is a core resource. Organizations require skilled and knowledgeable professionals who understand risks and responsibilities related to the management of information privacy, information security, and copyright/intellectual property. Professionals with this expertise can assist organizations to ensure that they and their employees meet requirements for the privacy and security of information in their care and control, and in order to ensure that neither the organization nor its employees contravene copyright provisions in their use of information. Failure to meet any of these responsibilities can expose the organization to reputational harm, legal action and/or financial loss. Context Inadequate or inappropriate information management practices of individual employees are at the root of organizational vulnerabilities with respect to information privacy, information security, and information ownership issues. Users demonstrate inadequate skills and knowledge coupled with inappropriate practices in these areas, and similar gaps at the organizational level are also widely documented. National and international regulatory frameworks governing information privacy, information security, and copyright/intellectual property are complex and in constant flux, placing additional burden on organizations to keep abreast of relevant regulatory and legal responsibilities. Governance and risk management related to information privacy, security, and ownership are critical to many job categories, including the emerging areas of information and knowledge management. There is an increasing need for skilled and knowledgeable individuals to fill organizational roles related to information management, with particular growth in these areas within the past 10 years. Our analysis of current job postings in Ontario supports the demand for skills and knowledge in these areas. Key Competencies We have developed a set of key competencies across a range of areas that responds to these needs by providing a blueprint for the training of information managers prepared for leadership and strategic positions. These competencies are identified in the full report. Competency areas include: conceptual foundations risk assessment tools and techniques for threat responses communications contract negotiation and compliance evaluation and assessment human resources management organizational knowledge management planning; policy awareness and compliance policy development project managemen

    A systematic comparison of different approaches of unsupervised extraction of text from scholary figures

    Get PDF
    Different approaches have been proposed in the past to address the challenge of extracting text from scholarly figures. However, so far a comparative evaluation of the different approaches has not been conducted. Based on an extensive study, we compare the 7 most relevant approaches described in the literature as well as 25 systematic combinations of methods for extracting text from scholarly figures. To this end, we define a generic pipeline, consisting of six individual steps. We map the existing approaches to this pipeline and re-implement their methods for each pipeline step. The method-wise re-implementation allows to freely combine the different possible methods for each pipeline step. Overall, we have evaluated 32 different pipeline configurations and systematically compared the different methods and approaches. We evaluate the pipeline configurations over four datasets of scholarly figures of different origin and characteristics. The quality of the extraction results is assessed using F-measure and Levenshtein distance. In addition, we measure the runtime performance. The experimental results show that there is an approach that overall shows the best text extraction quality on all datasets. Regarding runtime, we observe huge differences from very fast approaches to those running for several weeks

    Effects of petroleum fiscal regimes and tax instruments on the investment climate of marginal oil fields in Malaysia

    Get PDF
    Primarily, this study examines the effect of 2010 fiscal regime changes on the investment climate of marginal oil fields in Malaysia. The study also explores the effect fiscal regime changes on investors‘ capital expenditure (CAPEX) performance. It also investigates the relationship between tax instruments (types of profit-based tax, types of fiscal arrangement, crypto-based tax, production-based tax and tax incentives) and the investment climate of marginal oil fields as well as the moderating effect of an attractive petroleum fiscal regime on that relationship. Scenario analysis was used in examining the effect of 2010 fiscal regime changes on the investment climate of marginal oil fields. Trend analysis was employed in investigating the effect of fiscal regime changes on investors‘ CAPEX performance. Lastly, Partial Least Square (PLS) path modeling was used in examining the relationship between tax instruments and the investment climate of marginal oil fields as well as the moderating effect of an attractive petroleum fiscal regime. Findings from the scenario analysis showed that the investment climate of marginal oil fields improved after 2010 fiscal regime changes for low oil prices, mixed findings for medium oil price, however, the investment climate would have been better under old regime for high oil price scenarios. Investors‘ CAPEX performance increased significantly after the fiscal regime changes. Moreover, the finding shows that a petroleum profit tax, production-sharing contracts, and tax incentives had a significant positive relationship with the investment climate of marginal oil fields, but that the crypto-based tax and production-based tax had significant negative relationships. However, no significant relationship was established for the brown tax and the pure service contract. Furthermore, it was found that an attractive petroleum fiscal regime significantly moderated the relationship of the brown tax, production based tax, and tax incentives with the investment climate of marginal oil fields. However, no significant moderating effects of an attractive petroleum fiscal regime was established with respect to the crypto-based tax, petroleum income tax, production sharing contract, pure service contract. In line with these findings, practical, methodological and theoretical implications were highlighted, the study‘s limitations were discussed, and suggestions for future studies were offered

    Cloud Services Brokerage for Mobile Ubiquitous Computing

    Get PDF
    Recently, companies are adopting Mobile Cloud Computing (MCC) to efficiently deliver enterprise services to users (or consumers) on their personalized devices. MCC is the facilitation of mobile devices (e.g., smartphones, tablets, notebooks, and smart watches) to access virtualized services such as software applications, servers, storage, and network services over the Internet. With the advancement and diversity of the mobile landscape, there has been a growing trend in consumer attitude where a single user owns multiple mobile devices. This paradigm of supporting a single user or consumer to access multiple services from n-devices is referred to as the Ubiquitous Cloud Computing (UCC) or the Personal Cloud Computing. In the UCC era, consumers expect to have application and data consistency across their multiple devices and in real time. However, this expectation can be hindered by the intermittent loss of connectivity in wireless networks, user mobility, and peak load demands. Hence, this dissertation presents an architectural framework called, Cloud Services Brokerage for Mobile Ubiquitous Cloud Computing (CSB-UCC), which ensures soft real-time and reliable services consumption on multiple devices of users. The CSB-UCC acts as an application middleware broker that connects the n-devices of users to the multi-cloud services. The designed system determines the multi-cloud services based on the user's subscriptions and the n-devices are determined through device registration on the broker. The preliminary evaluations of the designed system shows that the following are achieved: 1) high scalability through the adoption of a distributed architecture of the brokerage service, 2) providing soft real-time application synchronization for consistent user experience through an enhanced mobile-to-cloud proximity-based access technique, 3) reliable error recovery from system failure through transactional services re-assignment to active nodes, and 4) transparent audit trail through access-level and context-centric provenance

    Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

    Full text link
    The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes. The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through the use of a variety of worms, botnets, malware, viruses and P2P file sharing. This project is focused on study of active P2P nodes along with the analysis of the undocumented communication methods employed in many of these large unstructured networks. This is achieved through the design and implementation of an efficient P2P monitoring and crawling toolset. The requirement for investigating P2P based systems is not limited to the more obvious cybercrimes listed above, as many legitimate P2P based applications may also be pertinent to a digital forensic investigation, e.g, voice over IP, instant messaging, etc. Investigating these networks has become increasingly difficult due to the broad range of network topologies and the ever increasing and evolving range of P2P based applications. In this work we introduce the Universal P2P Network Investigation Framework (UP2PNIF), a framework which enables significantly faster and less labour intensive investigation of newly discovered P2P networks through the exploitation of the commonalities in P2P network functionality. In combination with a reference database of known network characteristics, it is envisioned that any known P2P network can be instantly investigated using the framework, which can intelligently determine the best investigation methodology and greatly expedite the evidence gathering process. A proof of concept tool was developed for conducting investigations on the BitTorrent network.Comment: This is a thesis submitted in fulfilment of a PhD in Digital Forensics and Cybercrime Investigation in the School of Computer Science, University College Dublin in October 201

    The Rise and Fall of Canada\u27s Cold War Air Force, 1948-1968

    Get PDF
    This thesis examines the expansion of the Royal Canadian Air Force (RCAF) under the St. Laurent government with the concept of the Big Air Force that emerged from the defence re-armament programme announced on 5 February 1951. During this critical Cold War period, the RCAF became Canada’s first line of defence, making an essential contribution to the collective defence of Western Europe through the North Atlantic Treaty Organization. Concurrently, the RCAF underwent tremendous expansion in Canada contributing to North American defence, along with significant increases in its training, maritime and transport capabilities. The RCAF developed into the largest military service with the biggest portion of the defence budget. The notion of “airmindedness” that permeated all aspects of Canadian society enabled the development and implementation of the Big Air Force concept. Underlying the Big Air Force concept were two conflicting visions of air power, derived from leading theorists of the 1920s. The first was an independent role for aviation, “Douhet with nukes,” a Cold War reference to the ideas of Italian General Giulio Douhet. The second approach was American General William Mitchell’s “anything that flies” construct that embraced missions under the control of the army and navy and support to other agencies in such undertakings as air transport. By the late 1950s, the Big Air Force could not be sustained, thus marking its decline under the Diefenbaker and Pearson governments that was complete by the late 1960s. Despite some modernization in the late 1970s, successive governments adhered to the notion of a “minimalist air force” after 1969 until the end of the Cold War. This thesis considers the expansion and decline of the air force from the perspective of three inter-related thematic pillars – politics and economics, military strategy and technology. The predominance of air power represented the Canadian “way of war” during this time, and this legacy still resonates today with the ongoing debate regarding the F-35 aircraft for the RCAF’s Next Generation Fighter Capability programme
    • 

    corecore