41 resultados para XML HTML CSS JavaScript jQuery Cordova Android eLearning mLearning IncidentalLearning eLocal Gamification Geolocalizzazione


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a proposal for personal e-learning system (PELS) architecture in the context of social network environment. The main objective of PELS is to develop individual skills on a specific subject and share resources with peers. Our system architecture defines organization and management of personal learning environment that aids in creating, verifying and sharing learning artifacts and making money at the same time. We also focus on in our research one of the most interesting arenas in digital content or document management called Digital Right Management (DRAM) and its application to eLearning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a proposal for personal e-learning system (vPELS) architecture in the context of social network environment for VLSI Design. The main objective of vPELS is to develop individual skills on a specific subject, say, VLSI and share resources with peers. Our system architecture defines organization and management of personal learning environment that aids in creating, verifying and sharing learning artifacts and making money at the same time. We also focus on in our research one of the most interesting arenas in digital content or document management called Digital Right Management (DRAM) and its application to eLearning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since its establishment, the Android applications market has been infected by a proliferation of malicious applications. Recent studies show that rogue developers are injecting malware into legitimate market applications which are then installed on open source sites for consumer uptake. Often, applications are infected several times. In this paper, we investigate the behavior of malicious Android applications, we present a simple and effective way to safely execute and analyze them. As part of this analysis, we use the Android application sandbox Droidbox to generate behavioral graphs for each sample and these provide the basis of the development of patterns to aid in identifying it. As a result, we are able to determine if family names have been correctly assigned by current anti-virus vendors. Our results indicate that the traditional anti-virus mechanisms are not able to correctly identify malicious Android applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Can E-learning 2.0 provide a platform for improving performance in nonprofit organizations? It is argued that Web 2.0 technologies provide the tools that today’s students rely on in the learning environment. As such they may be the means to attract and retain learners in training and education programs designed to improve performance. E-learning delivered through a blended learning model has proven to be effective in corporate training and higher education. Can the interactive, collaborative model offered in E-learning 2 prove to be as effective? This paper reviews the literature on blended learning and capacity-building as background for a discussion of the potential that e-learning models enhanced by web 2.0 technologies have for expanding access to education and training and facilitating implementation of skills and knowledge gained in the workplace. We suggest that increasing training opportunities for staff and making nonprofit management education more accessible through online programs is not enough to meet the challenge. What is needed at this point is practicable education and training delivered in today’s user’s environment, that is online and “on the go.”

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increasing number of Android devices are being infected and at risk of becoming part of a botnet. Among all types of botnets, control and cornmand based botnets are very popular. In this paper we introduce an effective and efficient method to ddect SMS-based control commands ftvm infected Android devices. Specifically, we rely on the important radio activities recorded in Android log files. These radio activities are currently overlooked by researchers. We show the effectiveness of our rnethod by using the examples frorn published literature. Our method requires much less user knowledge but is more generic than traditional approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the past decade there has been massive growth of data on the internet. Many people rely on XML based RSS feeds to receive updates from websites. In this paper, we propose a method for managing the RSS feeds from various news websites. A web service is developed to deliver filtered news items from RSS feeds to a mobile client. Each news item is indexed, subsequently, the indexes are used for filtering news items. Indexing is done in two steps. First, classical text categorization algorithms are used to assign a category to each news item, second, geoparsing is used to assign geolocation data to each news item. An android application is developed to access filtered news items by consuming the proposed web service. A prototype is implemented using Rapid miner 5.0 as the data mining tool and SVM as the classification algorithm. Geoparsing and geocoding web services, and Android API are used to implement location-based access to news items. Experimental results prove that the proposed approach is effective and saves a significant amount of information overload processing time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content authenticity and correctness is one of the important challenges in eLearning as there can be many solutions for one specific problem in the cyber space. Therefore, we feel the necessity of mapping problem to solutions using graph partition and weighted bipartite matching. This paper presents a novel architecture and methodology for a personal eLearning system called PELS that is developed by us. We also present an efficient algorithm to partition question-answer (QA) space and explore best possible solution to a particular problem. Our approach can be efficiently applied to social eLearning space where there is one-to-many and many-to-many relationship with a level of bonding. The main advantage of our approach is that we use QA ranking by adjusted edge weights provided by subject matter experts (SME) or expert database. Finally, we use statistical methods called confidence interval and hypothesis test on the data to check the reliability and dependability of the quality of results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content authenticity and correctness is one of the important challenges in eLearning as there can be many solutions to one specific problem in cyber space. Therefore, the authors feel it is necessary to map problems to solutions using graph partition and weighted bipartite matching. This article proposes an efficient algorithm to partition question-answer (QA) space and explores the best possible solution to a particular problem. The approach described can be efficiently applied to social eLearning space where there are one-to-many and many-to-many relationships with a level of bonding. The main advantage of this approach is that it uses QA ranking by adjusted edge weights provided by subject-matter experts or the authors' expert database.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores Don DeLillo's literary activism through Arendtian perspectives to investigate what the demise of literature's relevance, specifically in a political context, may mean in the current era of an increasingly complex and conflicting 'web of human relationships'.  In that it is accepted that narrative has a particular ability to reveal insights as prelinguistic elements that are distinct from all we are able to access through our limited human perceptions, it remarks the Lacanian paradox that if being is in excess of language, then language is the medium by which this is accessed in the world. For DeLillo, writers may be under threat in a dynamic but destabilizing era, their art superceded by technology and fundamentalist terrorism, however, as suggested in Mao II, this renders the writer all the more necessary.  It is at the point at which the writer has nothing to say or is under duress to say noting, that a human crisis is reached. I ask, do current forms of political pressure to censure literature constitute a further diminishing of the Arendtian political public domain in which speech as action has primacy?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed. Contrary to existing work, both required and used permissions were considered when discovering the patterns. We evaluated our methodology on a clean and a malware dataset, each comprising of 1227 applications. Our empirical results suggest that our permission patterns can capture key differences between clean and malicious applications, which can assist in characterizing these two types of applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Regular expressions are used to parse textual data to match patterns and extract variables. They have been implemented in a vast number of programming languages with a significant quantity of research devoted to improving their operational efficiency. However, regular expressions are limited to finding linear matches. Little research has been done in the field of object-oriented results which would allow textual or binary data to be converted to multi-layered objects. This is significantly relevant as many of todaypsilas data formats are object-based. This paper extends our previous work by detailing an algorithmic approach to perform object-oriented parsing, and provides an initial study of benchmarks of the algorithms of our contribution

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Android is a new generation of an open operating system directed at mobile devices that are carried every day. The openness of this architecture is leading to new applications and opportunities including a host of multimedia services, new interfaces and browsers, multitasking including support for wireless local, personal and wide area networking services. Security with mobility and wireless connectivity thus becomes even more important with all these exciting developments. Vital security issues such as leakage of private information, file stealing and spambots abound in networks in practice and Android networks continue to be subject to these same families of vulnerabilities. This paper provides a demonstration of such vulnerabilities in spite of the best efforts of designers and implementers. In particular it describes examples of data leakage and file stealing (address books, contact lists, SMS messages, pictures) as well as demonstrating how Android devices can create spambots. © 2013 IEEE.