3,410 research outputs found

    Toroidal vertex algebras and their modules

    Get PDF
    We develop a theory of toroidal vertex algebras and their modules, and we give a conceptual construction of toroidal vertex algebras and their modules. As an application, we associate toroidal vertex algebras and their modules to toroidal Lie algebras.Comment: 36 page

    Location-Based Learning Management System for Adaptive Mobile Learning

    Get PDF
    E-learning and distance learning are all forms of learning that take place outside of a traditional learning environment and can be alternatives for learners who are not able to study in a traditional environment for various reasons. With advancement in technologies and increased use of smart phone, mobile learning has gained popularity as another form of learning and has enabled learners to learn anywhere and anytime. Ubiquitous learning takes mobile learning to another level by providing contents that are context and location aware. There is therefore the need to provide mobile devices with the right learning contents for the right users. The right learning contents should be adaptive to the learner’s location, as well as learning style and device etc. To be able to implement the learning, learning management systems play the important role in creating, managing, and delivering the learning contents. In this paper, a location-based Learning Management System for adaptive and personalized mobile learning is presented. The systems makes use of 5R Adaptation Framework for Location based Mobile learning, the location-based dynamic grouping algorithm, and concepts of the IMS Learning Design model to produce a location-based adaptive mobile learning setting

    Multitenancy - Security Risks and Countermeasures

    Get PDF
    Security within the cloud is of paramount importance as the interest and indeed utilization of cloud computing increase. Multitenancy in particular introduces unique security risks to cloud computing as a result of more than one tenant utilizing the same physical computer hardware and sharing the same software and data. The purpose of this paper is to explore the specific risks in cloud computing due to Multitenancy and the measures that can be taken to mitigate those risks.Security within the cloud is of paramount importance as the interest and indeed utilization of cloud computing increase. Multitenancy in particular introduces unique security risks to cloud computing as a result of more than one tenant utilizing the same physical computer hardware and sharing the same software and data. The purpose of this paper is to explore the specific risks in cloud computing due to Multitenancy and the measures that can be taken to mitigate those risks
    • …
    corecore