68 research outputs found

    The Missing Link: An Introduction to Web Development and Programming

    Get PDF
    Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and standards. Navigating a project from concept to completion often requires more than mastery of one or two complementing languages, meaning today’s developers need both breadth, and depth, of knowledge to be effective. This text provides the developer with an understanding of the various elements of web development by focusing on the concepts and fundamentals through the examples within, providing a foundation that allows easier transition to other languages and a better understanding of how to approach their work. The reader will be introduced to topics in a manner that follows most project development methods, from initial conceptualization and design through front end development, back end development, and introducing additional concepts like accessibility and security, while focusing on responsive design techniques. Each section of the text includes opportunities to practice the material and assess increased knowledge after examining the topics.https://knightscholar.geneseo.edu/oer-ost/1016/thumbnail.jp

    The Impact Of The Development Of ICT In Several Hungarian Economic Sectors

    Get PDF
    As the author could not find a reassuring mathematical and statistical method in the literature for studying the effect of information communication technology on enterprises, the author suggested a new research and analysis method that he also used to study the Hungarian economic sectors. The question of what factors have an effect on their net income is vital for enterprises. At first, the author studied some potential indicators related to economic sectors, then those indicators were compared to the net income of the surveyed enterprises. The resulting data showed that the growing penetration of electronic marketplaces contributed to the change of the net income of enterprises to the greatest extent. Furthermore, among all the potential indicators, it was the only indicator directly influencing the net income of enterprises. With the help of the compound indicator and the financial data of the studied economic sectors, the author made an attempt to find a connection between the development level of ICT and profitability. Profitability and productivity are influenced by a lot of other factors as well. As the effect of the other factors could not be measured, the results – shown in a coordinate system - are not full but informative. The highest increment of specific Gross Value Added was produced by the fields of ‘Manufacturing’, ‘Electricity, gas and water supply’, ‘Transport, storage and communication’ and ‘Financial intermediation’. With the exception of ‘Electricity, gas and water supply’, the other economic sectors belong to the group of underdeveloped branches (below 50 percent). On the other hand, ‘Construction’, ‘Health and social work’ and ‘Hotels and restaurants’ can be seen as laggards, so they got into the lower left part of the coordinate system. ‘Agriculture, hunting and forestry’ can also be classified as a laggard economic sector, but as the effect of the compound indicator on the increment of Gross Value Added was less significant, it can be found in the upper left part of the coordinate system. Drawing a trend line on the points, it can be made clear that it shows a positive gradient, that is, the higher the usage of ICT devices, the higher improvement can be detected in the specific Gross Value Added

    A computer graphics approach to logistics strategy modelling

    Get PDF
    This thesis describes the development and application of a decision support system for logistics strategy modelling. The decision support system that is developed enables the modelling of logistics systems at a strategic level for any country or area in the world. The model runs on IBM PC or compatible computers under DOS (disk operating system). The decision support system uses colour graphics to represent the different physical functions of a logistics system. The graphics of the system is machine independent. The model displays on the screen the map of the area or country which is being considered for logistic planning. The decision support system is hybrid in term of algorithm. It employs optimisation for allocation. The customers are allocated by building a network path from customer to the source points taking into consideration all the production and throughput constraints on factories, distribution depots and transshipment points. The system uses computer graphic visually interactive heuristics to find the best possible location for distribution depots and transshipment points. In a one depot system it gives the optimum solution but where more than one depot is involved, the optimum solution is not guaranteed. The developed model is a cost-driven model. It represents all the logistics system costs in their proper form. Its solution very much depends on the relationship between all the costs. The locations of depots and transshipment points depend on the relationship between inbound and outbound transportation costs. The model has been validated on real world problems, some of which are described here. The advantages of such a decision support system for the formulation of a problem are discussed. Also discussed is the contribution of such an approach at the validation and solution presentation stages

    Behavioural biometric identification based on human computer interaction

    Get PDF
    As we become increasingly dependent on information systems, personal identification and profiling systems have received an increasing interest, either for reasons of personali- sation or security. Biometric profiling is one means of identification which can be achieved by analysing something the user is or does (e.g., a fingerprint, signature, face, voice). This Ph.D. research focuses on behavioural biometrics, a subset of biometrics that is concerned with the patterns of conscious or unconscious behaviour of a person, involving their style, preference, skills, knowledge, motor-skills in any domain. In this work I explore the cre- ation of user profiles to be applied in dynamic user identification based on the biometric pat- terns observed during normal Human-Computer Interaction (HCI) by continuously logging and tracking the corresponding computer events. Unlike most of the biometrics systems that need special hardware devices (e.g. finger print reader), HCI-based identification sys- tems can be implemented using regular input devices (mouse or keyboard) and they do not require the user to perform specific tasks to train the system. Specifically, three components are studied in-depth: mouse dynamics, keystrokes dynamics and GUI based user behaviour. In this work I will describe my research on HCI-based behavioural biometrics, discuss the features and models I proposed for each component along with the result of experiments. In addition, I will describe the methodology and datasets I gathered using my LoggerMan application that has been developed specifically to passively gather behavioural biometric data for evaluation. Results show that normal Human-Computer Interaction reveals behavioural information with discriminative power sufficient to be used for user modelling for identification purposes

    Enhanced e-learning and simulation for obstetrics education

    Get PDF
    Background: In medicine, new media technologies have been used in recent years to simulate situations and techniques that may not be common enough for students to experience in reality or may not be visible to the naked eye. Especially in areas of medicine focusing on important surgeries or procedures, these simulated designs could train students and ultimately prevent possible risk or morbidity. Aims: The aim of this thesis was to develop a multipurpose hybrid educational resource based on a physical/software driven simulator platform enabling the use of multimedia properties like 3D and video to enhance the educational training of obstetrics students through haptic interactions. All of this content was enabled by the learning preferences of the obstetric students involved. Method: The learning resource was developed using a combination of student learning preference, online learning content, 3D, video, human patient simulations and sensor technology interaction. These mediums were all interconnected to create a multipurpose resource. The learning preference was collected through a developed student online survey, the results consequently informed the creation of the other aspects of the finished resource. The interactive aspects were created through position and orientation sensors and the 3D/video influences which localised the position and orientation of an object like a fetal model relative to a human patient simulator. All of these methods combined with added assessment contributions for obstetric tutors, enabled the finalising of a prototype. Conclusion: This form of learning resource has a vital role in the progressing higher level education in the digital age. This proposal is the development of a new type of joint simulator that allows students and practitioners physically involve themselves in a series of processes while assessing their own progression through real time digital feedback in the form of video narrative and analytics. Usability test was not conducted on the full resource (one on the video platform) due to time limitations

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Exploring human factors issues & possible countermeasures in password authentication

    Get PDF
    PhD ThesisThis thesis is concerned with usable security. It describes a series of experiments to understand users’ behaviour in the domain of password authentication. The thesis is comprised of two parts. Part 1 reports on experiments into how different persuasion strategies can be used to increase the strength of users’ password. Existing research indicates that the lack of persuasive elements in password guidelines may lead to a lack of motivation to produce strong passwords. Thus, an experimental study involving seventy-five participants was conducted to evaluate the effectiveness of a range of persuasion strategies on password strength. In addition this experiment explores how personality variables affect the susceptibility of users to persuasion. The results showed that passwords created by users who received password guidelines that include a persuasion strategy produce stronger passwords than a control group. In terms of the personality variables, the result shows that there are certain personality types that tend to produce slightly better passwords than others; but it is difficult to draw a firm conclusion about how personality affects susceptibility to persuasion. The second part of this thesis presents an innovative alternative to text-based passwords, namely, graphical password schemes. Graphical passwords take advantage of the superior ability of humans to remember graphics and pictures over text and numbers. Research shows that graphical password schemes are a promising alternative, but that they are susceptible to shoulder surfing attacks, resulting in scepticism about adoption. Thus in part 2 of the thesis, three innovative shoulder surfing defence techniques are proposed and implemented in a small-scale prototype with a specific focus given to one type of graphical password; The Draw-A-Secret (DAS) scheme. The results of two separate experimental studies involving sixty-five and thirty participants respectively to evaluate the proposed defence techniques from the perspectives of security and usability are presented. The results show that the technique which, on theoretical grounds, was expected to be quite effective, provides little protection. A second technique which did provide the best overall shoulder surfing defence; created usability problems. But a third technique provided a reasonable shoulder surfing defence and good usability simultaneously; a good balance which the other two techniques did not achieve. The proposed defence techniques and experimental results are directly relevant to other graphical password schemes of the same category with slight modification to suit the requirements of the scheme intended. In summary, the thesis contributes to the discussion of some key usability problems which exist around password authentication domains. All the proposed countermeasures are evaluated through a series of experimental studies which present several intriguing discussions and promising findings
    corecore