34 research outputs found

    An innovative web application for managing academic documents

    Get PDF
    Archiving versions of academic documents in consideration of green thinking was the motivation to develop an innovative tool that could organize academic documents in a centralized database. This paper presents a new web application, which aims to move towards a paperless University model for managing academic documents that are used within an educational institution, such as proposal courses, syllabuses etc. AcaDocMan, the developed application can be used by academic staff and quality assurance officers of institutions who are able not only to manage their course syllabuses but also to generate different consistent document formats for various purposes

    Cloud eLearning - Personalisation of learning using resources from the Cloud

    Get PDF
    With the advancement of technologies, the usage of alternative eLearning systems as complementary systems to the traditional education systems is becoming part of the everyday activities. At the same time, the creation of learning resources has increased exponentially over time. However, the usability and reusability of these learning resources in various eLearning systems is difficult when they are unstandardised and semi-standardised learning resources. Furthermore, eLearning activitiesā€™ lack of suitable personalisation of the overall learning process fails to optimize resourcesā€™ and systemsā€™ potentialities. At the same time, the evolution of learning technologies and cloud computing creates new opportunities for traditional eLearning to evolve and place the learner in the center of educational experiences. This thesis contributes to a holistic approach to the field by using a combination of artificial intelligence techniques to automatically generate a personalized learning path for individual learners using Cloud resources. We proposed an advancement of eLearning, named the Cloud eLearning, which recognizes that resources stored in Cloud eLearning can potentially be used for learning purposes. Further, the personalised content shown to Cloud Learners will be offered through automated personalized learning paths. The main issue was to select the most appropriate learning resources from the Cloud and include them in a personalised learning path. This become even more challenging when these potential learning resources were derived from various sources that might be structured, semi- structure or even unstructured, tending to increase the complexity of overall Cloud eLearning retrieval and matching processes. Therefore, this thesis presents an original concept,the Cloud eLearning, its Cloud eLearning Learning Objects as the smallest standardized learning objects, which permits reusing them because of semantic tagging with metadata. Further, it presents the Cloud eLearning Recommender System, that uses hierarchical clustering to select the most appropriate resources and utilise a vector space model to rank these resources in order of relevance for any individual learner. And it concludes with Cloud eLearning automated planner, which generates a personalised learning path using the output of the CeL recommender system

    Fraud Detection using Data-Driven approach

    Full text link
    The extensive use of the internet is continuously drifting businesses to incorporate their services in the online environment. One of the first spectrums to embrace this evolution was the banking sector. In fact, the first known online banking service came in 1980. It was deployed from a community bank located in Knoxville, called the United American Bank. Since then, internet banking has been offering ease and efficiency to costumers in completing their daily banking tasks. The ever increasing use of internet banking and a large number of online transactions increased fraudulent behavior also. As if fraud increase was not enough, the massive number of online transactions further increased the data complexity. Modern data sources are not only complex but generated at high speed and in real-time as well. This presents a serious problem and a definite reason why more advanced solutions are desired to protect financial service companies and credit cardholders. Therefore, this research paper aims to construct an efficient fraud detection model which is adaptive to customer behavior changes and tends to decrease fraud manipulation, by detecting and filtering fraud in real-time. In order to achieve this aim, a review of various methods is conducted, adding above a personal experience working in the Banking sector, specifically in the Fraud Detection office. Unlike the majority of reviewed methods, the proposed model in this research paper is able to detect fraud in the moment of occurrence using an incremental classifier. The evaluation of synthetic data, based on fraud scenarios selected in collaboration with domain experts that replicate typical, real-world attacks, shows that this approach correctly ranks complex frauds. In particular, our proposal detects fraudulent behavior and anomalies with up to 97\% detection rate while maintaining a satisfyingly low cost.Comment: 7 pages, 2 figure

    Cleaner Robot in the Cloud ā€“ Cleo

    Get PDF
    With the upcoming of cloud computing technology, the robots doesnā€™t have to act anymore on their own but they can learn from the experiences of other robots. The main idea of this proposal is how to share knowledge between heterogeneous robots and how to move the processing power from robots to the cloud via cloud computing. A demonstration is thought to be realized using clean robots and the services of cloud computing platform RoboEarth. The orientation and position coordinates of the cleaner robot can easily be calculated by using the encoder and electronic compass. The ultrasonic distance sensor will scan the environment for obstacles and for the borders of the unknown environment. All this information will be transferred to the cloud platform which then uses the path planning algorithm for the coverage of the complete environment for cleaning task. The processing power of the cloud technology enables the low cost production of the cleaner robot. The path planning algorithm based on small area segmentation will be used to control the robot motion and to cover the complete environment

    Security Concerns of new alternative telecommunication services

    Get PDF
    With the advancing new era of communication, the so-called era of ā€˜being always onlineā€™ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ā€œtheseā€ services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using ā€œfreeā€ services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using ā€œfreeā€ online services, also offering a birdā€™s eye view of numerous recommendations developed by various standard organizations

    The impact of new alternative telecommunication services on the strategy of traditional telecom providers in Kosovo

    Get PDF
    The main purpose of this paper is to analyze the impact of new alternative telecommunication services (voip, skype, facebook and twitter) to the strategy of traditional telecom providers in Kosovo from the both areas of social media and telecommunication industry. Telecommunication industry is considered as the most dynamic industry in terms of technology and services. The last decade has been the evolution of new technologies and services that changed not only the world but also the meaning of our voice and messages to the world. Comparing with last decadeā€™s communication tools and prices, today we have enormous number of commun ication tools that keeps us informed for every single issue that doesnā€™t matter where it happens. All these changes and trends will be analyzed and presented thru a proper research on consumerā€™s behavior and product development teams

    Security Concerns of new alternative telecommunication services

    Get PDF
    With the advancing new era of communication, the so-called era of ā€˜being always onlineā€™ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ā€œtheseā€ services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using ā€œfreeā€ services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using ā€œfreeā€ online services, also offering a birdā€™s eye view of numerous recommendations developed by various standard organizations

    Security Concerns of new alternative telecommunication services

    Get PDF
    With the advancing new era of communication, the so-called era of ā€˜being always onlineā€™ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ā€œtheseā€ services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using ā€œfreeā€ services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using ā€œfreeā€ online services, also offering a birdā€™s eye view of numerous recommendations developed by various standard organizations
    corecore