34 research outputs found
An innovative web application for managing academic documents
Archiving versions of academic documents in consideration of green thinking was the motivation to develop an innovative tool that could organize academic documents in a centralized database. This paper presents a new web application, which aims to move towards a paperless University model for managing academic documents that are used within an educational institution, such as proposal courses, syllabuses etc. AcaDocMan, the developed application can be used by academic staff and quality assurance officers of institutions who are able not only to manage their course syllabuses but also to generate different consistent document formats for various purposes
Cloud eLearning - Personalisation of learning using resources from the Cloud
With the advancement of technologies, the usage of alternative eLearning systems as complementary
systems to the traditional education systems is becoming part of the everyday activities. At the same time, the creation of learning resources has increased exponentially
over time. However, the usability and reusability of these learning resources in various eLearning systems is difficult when they are unstandardised and semi-standardised learning
resources. Furthermore, eLearning activitiesā lack of suitable personalisation of the overall learning process fails to optimize resourcesā and systemsā potentialities. At the same time, the evolution of learning technologies and cloud computing creates new opportunities for
traditional eLearning to evolve and place the learner in the center of educational experiences.
This thesis contributes to a holistic approach to the field by using a combination of artificial intelligence techniques to automatically generate a personalized learning path for
individual learners using Cloud resources. We proposed an advancement of eLearning, named the Cloud eLearning, which recognizes that resources stored in Cloud eLearning can
potentially be used for learning purposes. Further, the personalised content shown to Cloud Learners will be offered through automated personalized learning paths. The main issue was to select the most appropriate learning resources from the Cloud and include them in a personalised learning path. This become even more challenging when these potential learning resources were derived from various sources that might be structured, semi- structure or even unstructured, tending to increase the complexity of overall Cloud eLearning retrieval and matching processes.
Therefore, this thesis presents an original concept,the Cloud eLearning, its Cloud eLearning Learning Objects as the smallest standardized learning objects, which permits reusing them because of semantic tagging with metadata. Further, it presents the Cloud eLearning Recommender System, that uses hierarchical clustering to select the most appropriate resources and utilise a vector space model to rank these resources in order of relevance for any individual learner. And it concludes with Cloud eLearning automated planner, which generates a personalised learning path using the output of the CeL recommender system
Fraud Detection using Data-Driven approach
The extensive use of the internet is continuously drifting businesses to
incorporate their services in the online environment. One of the first
spectrums to embrace this evolution was the banking sector. In fact, the first
known online banking service came in 1980. It was deployed from a community
bank located in Knoxville, called the United American Bank. Since then,
internet banking has been offering ease and efficiency to costumers in
completing their daily banking tasks.
The ever increasing use of internet banking and a large number of online
transactions increased fraudulent behavior also. As if fraud increase was not
enough, the massive number of online transactions further increased the data
complexity. Modern data sources are not only complex but generated at high
speed and in real-time as well. This presents a serious problem and a definite
reason why more advanced solutions are desired to protect financial service
companies and credit cardholders.
Therefore, this research paper aims to construct an efficient fraud detection
model which is adaptive to customer behavior changes and tends to decrease
fraud manipulation, by detecting and filtering fraud in real-time. In order to
achieve this aim, a review of various methods is conducted, adding above a
personal experience working in the Banking sector, specifically in the Fraud
Detection office. Unlike the majority of reviewed methods, the proposed model
in this research paper is able to detect fraud in the moment of occurrence
using an incremental classifier. The evaluation of synthetic data, based on
fraud scenarios selected in collaboration with domain experts that replicate
typical, real-world attacks, shows that this approach correctly ranks complex
frauds. In particular, our proposal detects fraudulent behavior and anomalies
with up to 97\% detection rate while maintaining a satisfyingly low cost.Comment: 7 pages, 2 figure
Cleaner Robot in the Cloud ā Cleo
With the upcoming of cloud computing technology, the robots doesnāt have to act anymore on their own but they can learn from the experiences of other robots. The main idea of this proposal is how to share knowledge between heterogeneous robots and how to move the processing power from robots to the cloud via cloud computing. A demonstration is thought to be realized using clean robots and the services of cloud computing platform RoboEarth. The orientation and position coordinates of the cleaner robot can easily be calculated by using the encoder and electronic compass. The ultrasonic distance sensor will scan the environment for obstacles and for the borders of the unknown environment. All this information will be transferred to the cloud platform which then uses the path planning algorithm for the coverage of the complete environment for cleaning task. The processing power of the cloud technology enables the low cost production of the cleaner robot. The path planning algorithm based on small area segmentation will be used to control the robot motion and to cover the complete environment
Security Concerns of new alternative telecommunication services
With the advancing new era of communication, the so-called era of ābeing always onlineā many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ātheseā services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using āfreeā services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using āfreeā online services, also offering a birdās eye view of numerous recommendations developed by various standard organizations
The impact of new alternative telecommunication services on the strategy of traditional telecom providers in Kosovo
The main purpose of this paper is to analyze the impact of new alternative telecommunication services (voip, skype, facebook and twitter) to the strategy of traditional telecom providers in Kosovo from the both areas of social media and telecommunication industry. Telecommunication industry is considered as the most dynamic industry in terms of technology and services. The last decade has been the evolution of new technologies and services that changed not only the world but also the meaning of our voice and messages to the world. Comparing with last decadeās communication tools and prices, today we have enormous number of commun ication tools that keeps us informed for every single issue that doesnāt matter where it happens. All these changes and trends will be analyzed and presented thru a proper research on consumerās behavior and product development teams
Security Concerns of new alternative telecommunication services
With the advancing new era of communication, the so-called era of ābeing always onlineā many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ātheseā services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using āfreeā services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using āfreeā online services, also offering a birdās eye view of numerous recommendations developed by various standard organizations
Security Concerns of new alternative telecommunication services
With the advancing new era of communication, the so-called era of ābeing always onlineā many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ātheseā services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using āfreeā services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using āfreeā online services, also offering a birdās eye view of numerous recommendations developed by various standard organizations