Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim
Siti Salwah Salim Prof. Dr.
E-learning storyboards have been a useful approach in distance learning development to support interaction between instructional designers and subject-matter experts. Current works show that researchers are focusing on different approaches for use in storyboards, and there is less emphasis on the effect of design and process difficulties faced by instructional designers and subject-matter experts. This study explores problem aspects of the cognitive task and the skills required of subject-matter experts by applying a cognitive task analysis approach from the expert point of view. The result shows that subject-matter experts face difficulties in making decisions on three elements during e-learning course ...
Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, 2011 University of Malaya
Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim
Siti Salwah Salim Prof. Dr.
Abstract This research targets persistency by introducing new features in ‘Chatsistance’, a persistent chat tool that employs speech act theory and an explicit referencing technique to structure the chat log, and by providing further options for retrieving information. Earlier theory is related to the linguistics and characteristics of user statements. The later technique shows the relation of artefacts in an interconnected context named ‘explicit referencing’. Although speech actswere previously used in the field of chat, it is the first time that this theory has been used for the purpose of enhancing persistency combined with an explicit referencing technique,which together ...
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, 2011 University of Missouri - St Louis
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers ...
Effective Security By Obscurity, 2011 Southern Methodist University
Effective Security By Obscurity, John Christian Smith
John Christian Smith
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for ...
Dirty Tricks Played By The Domain Registrars, 2011 SelectedWorks
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.
Quantifying Computer Network Security, 2011 Western Kentucky University
Quantifying Computer Network Security, Ian Burchett
Masters Theses & Specialist Projects
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s ...
Assessing Ipv6 Through Web Access - A Measurement Study And Its Findings, 2011 University of Pennsylvania
Assessing Ipv6 Through Web Access - A Measurement Study And Its Findings, Mehdi Nikkhah, Roch A. Guérin, Yiu Lee, Richard Woundy
Departmental Papers (ESE)
Transitioning an infrastructure the size of the Internet is no small feat. We are in the midst of such a transition, \ie from IPv4 to IPv6. IPv6 was standardized 15~years ago, but until recently there were few incentives to adopt it. The allocation of the last large block of IPv4 addresses changed that, and migrating to an IPv6 Internet has become more urgent. This migration is, however, still rife with uncertainties and challenges. The goal of this paper is to provide insight into this transition, and possibly make it smoother. The focus is on the ``network,'' and the paper ...
Computing Inconsistency Measure Based On Paraconsistent Semantics, 2011 Wright State University - Main Campus
Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi
Computer Science and Engineering Faculty Publications
Measuring inconsistency in knowledge bases has been recognized as an important problem in several research areas. Many methods have been proposed to solve this problem and a main class of them is based on some kind of paraconsistent semantics. However, existing methods suffer from two limitations: (i) they are mostly restricted to propositional knowledge bases; (ii) very few of them discuss computational aspects of computing inconsistency measures. In this article, we try to solve these two limitations by exploring algorithms for computing an inconsistency measure of first-order knowledge bases. After introducing a four-valued semantics for first-order logic, we define an ...
Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, 2011 Wright State University - Main Campus
Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey
This report provides an overview of the field of contrast data mining and its applications, and offers a preview of an upcoming book on the topic. The importance of contrasting is discussed and a brief survey is given covering the following topics: general definitions and terminology for contrast patterns, representative contrast pattern mining algorithms, applications of contrast mining for fundamental data mining tasks such as classification and clustering, applications of contrast mining in bioinformatics, medicine, blog analysis, image analysis and subgroup mining, results on contrast based dataset similarity measure, and on analyzing item interaction in contrast patterns, and open research ...
Distributed Algorithms For Energy Savings In The Core Network, 2011 University of Nebraska-Lincoln
Distributed Algorithms For Energy Savings In The Core Network, Lin Liu
Computer Science and Engineering: Theses, Dissertations, and Student Research
Recently, many efforts have been undertaken to reduce the energy consumption of core networks. Bundle link is a commonly deployed technique in core networks to combine several high-speed physical sublinks into a virtual connection to achieve bandwidth upgrade flexibility and network reliability. The traffic passing through a bundle link can be carried fully over the first few sublinks (bin packing) or evenly distributed over all sublinks (load balancing). In the current network when a bundle link is on, all of its sublinks are on, thus, selectively shutting down a few sublinks during periods of low traffic could save a large ...
High-Performance Java Platform Computing, 2011 Loyola University Chicago
High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal
George K. Thiruvathukal
Threading and concurrency are crucial to building high-performance Java applications -- but they have a reputation for complexity. High Performance Java Computing thoroughly demystifies these advanced development techniques. It delivers practical programming solutions, proven design patterns, and a rigorously-tested code library -- everything developers need to build optimized Java software for technical, business, and E-commerce applications. Start by understanding how threading and concurrency can be used to solve a wide variety of performance problems, enabling the construction of more powerful networked applications. Master the Java 2 Threads classes, including daemon threads, thread control, scheduling, and more. Review the key problems of parallelism ...
Trust-Based Service Selection, 2011 The University of Western Ontario
Trust-Based Service Selection, Zainab Aljazzaf
Electronic Thesis and Dissertation Repository
Service Oriented Architecture (SOA) is an architectural style that builds enterprise solutions based on services. In SOA, the lack of trust between different parties affects the adoption of such architecture. Trust is as significant a factor for successful online interactions as it is in real life communities, and consequently, it is an important factor that is used as a criterion for service selection. In the context of online services and SOA, the literature shows that the field of trust is not mature. Trust definition and the consideration of the essentials of trust aspects do not reflect the true nature of ...
Non-Redundant Sequential Rules,Theory And Algorithm, 2011 Singapore Management University
Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong
A sequential rule expresses a relationship between two series of events happening one after another. Sequential rules are potentially useful for analyzing data in sequential format, ranging from purchase histories, network logs and program execution traces. In this work, we investigate and propose a syntactic characterization of a non-redundant set of sequential rules built upon past work on compact set of representative patterns. A rule is redundant if it can be inferred from another rule having the same support and confidence. When using the set of mined rules as a composite filter, replacing a full set of rules with a ...
The Knowledge-Driven Exploration Of Integrated Biomedical Knowledge Sources Facilitates The Generation Of New Hypotheses, 2011 Wright State University - Main Campus
The Knowledge-Driven Exploration Of Integrated Biomedical Knowledge Sources Facilitates The Generation Of New Hypotheses, Vinh Nguyen, Olivier Bodenreider, Todd Minning, Amit P. Sheth
Knowledge gained from the scientific literature can complement newly obtained experimental data in helping researchers understand the pathological processes underlying diseases. However, unless the scientific literature and experimental data are semantically integrated, it is generally difficult for scientists to exploit the two sources effectively. We argue that, in addition to the semantic integration of heterogeneous knowledge sources, the usability of the integrated resource by scientists is dependent upon the availability of knowledge visualization and exploration tools. Moreover, the integration techniques must be scalable and the exploration interfaces must be easy to use by bench scientists. The end goal of such ...
Demonstration: Secure - Semantics Empowered Rescue Environment, 2011 Wright State University - Main Campus
Demonstration: Secure - Semantics Empowered Rescue Environment, Pratikkumar Desai, Cory Andrew Henson, Pramod Anantharam, Amit P. Sheth
This paper demonstrates a Semantic Web enabled system for collecting and processing sensor data within a rescue environment. The real-time system collects heterogeneous raw sensor data from rescue robots through a wireless sensor network. The raw sensor data is converted to RDF using the Semantic Sensor Network (SSN) ontology and further processed to generate abstractions used for event detection in emergency scenarios.
Demonstration: Real-Time Semantic Analysis Of Sensor Streams, 2011 Wright State University - Main Campus
Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan
The emergence of dynamic information sources – including sensor networks – has led to large streams of real-time data on the Web. Research studies suggest, these dynamic networks have created more data in the last three years than in the entire history of civilization, and this trend will only increase in the coming years . With this coming data explosion, real-time analytics software must either adapt or die . This paper focuses on the task of integrating and analyzing multiple heterogeneous streams of sensor data with the goal of creating meaningful abstractions, or features. These features are then temporally aggregated into feature ...
Personalized Filtering Of The Twitter Stream, 2011 Wright State University - Main Campus
Personalized Filtering Of The Twitter Stream, Pavan Kapanipathi, Fabrizio Orlandi, Amit P. Sheth, Alexandre Passant
With the rapid growth in users on social networks, there is a corresponding increase in user-generated content, in turn resulting in information overload. On Twitter, for example, users tend to receive uninterested information due to their non-overlapping interests from the people whom they follow. In this paper we present a Semantic Web approach to filter public tweets matching interests from personalized user profiles. Our approach includes automatic generation of multi-domain and personalized user profiles, filtering Twitter stream based on the generated profiles and delivering them in real-time. Given that users interests and personalization needs change with time, we also discuss ...
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, 2011 Wright State University - Main Campus
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Users of traditional microblogging platforms such as Twitter face drawbacks in terms of (1) Privacy of status updates as a followee - reaching undesired people (2) Information overload as a follower - receiving uninteresting microposts from followees. In this paper we demonstrate distributed and user-controlled dissemination of microposts using SMOB (semantic microblogging framework) and Semantic Hub (privacy-aware implementation of PuSH3 protocol) . The approach leverages users' Social Graph to dynamically create group of followers who are eligible to receive micropost. The restrictions to create the groups are provided by the followee based on the hastags in the micropost. Both SMOB and Semantic Hub ...
Semantic Annotation And Search For Resources In The Next Generation Web With Sa-Rest, 2011 Wright State University - Main Campus
Semantic Annotation And Search For Resources In The Next Generation Web With Sa-Rest, Ajith H. Ranabahu, Amit P. Sheth, Maryam Panahiazar, Sanjaya Wijeratne
SA-REST, the W3C member submission, can be used for supporting a wide variety of Plain Old Semantic HTML (POSH) annotation capabilities on any type of Web resource. Kino framework and tools provide support of capabilities to realize SA-RESTs promised value. These tools include (a) a browser-plugin to support annotation of a Web resource (including services) with respect to an ontology, domain model or vocabulary, (b) an annotation aware indexing engine and (c) faceted search and selection of the Web resources. At one end of the spectrum, we present KinoE (aka Kino for Enterprise) which uses NCBO formal ontologies and ...
A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, 2011 Wright State University - Main Campus
A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan
Cloud computing has changed the technology landscape by offering flexible and economical computing resources to the masses. However, vendor lock-in makes the migration of applications and data across clouds an expensive proposition. The lock-in is especially serious when considering the new technology trend of combining cloud with mobile devices.
In this paper, we present a domain specific language (DSL) that is purposely created for generating hybrid applications spanning across mobile devices as well as computing clouds. We propose a model-driven development process that makes use of a DSL to provide sufficient programming abstractions over both cloud and mobile features. We ...