Results (486)
Search Parameters:
Keyword: ImplementSemantic modeling of portfolio assessment in e-learning environment
In learning environment, portfolio is used as a tool to keep track of learner’s progress. Particularly, when it comes to e-learning, continuous assessment allows greater customization and efficiency in learning process and prevents students lost interest in their study. Also, each student has his own characteristics and learning skills that must be taken into account…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreMobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks
The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy…
Read MoreConfiguration/Infrastructure-aware testing of MapReduce programs
The implemented programs in the MapReduce processing model are focused in the analysis of large volume of data in a distributed and parallel architecture. This architecture is automatically managed by the framework, so the developer could be focused in the program functionality regardless of infrastructure failures or resource allocation. However, the infrastructure state can cause…
Read MoreA Novel Approach for Designing Mobile Native Apps
Mobile devices are differed from desktop based systems in terms of particular execution environment, constrained resources, and high mobility requirement. To overcome these shortcomings, various agile based methodologies are developed for native mobile applications such as Mobile-D, Scrum etc. These agile techniques are based on various phases and these phases begin from exploring, initializing and…
Read MoreOptimized Multi-focus Image Fusion Using Genetic Algorithm
Optical imaging systems or cameras have a convex lens with limited depth of field. So, multi-focus images are obtained when such systems are used to capture an image of a particular scene. These images are fused to get all-in-focus image. This paper proposes a new simpler method of multi-focus image fusion. Instead of decomposing input…
Read MoreOperational Efficiencies and Simulated Performance of Big Data Analytics Platform over Billions of Patient Records of a Hospital System
Big Data Analytics (BDA) is important to utilize data from hospital systems to reduce healthcare costs. BDA enable queries of large volumes of patient data in an interactively dynamic way for healthcare. The study objective was high performance establishment of interactive BDA platform of hospital system. A Hadoop/MapReduce framework was established at University of Victoria…
Read MoreSystem Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate
Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read MoreARM based Bidirectional Visitor Counter and Automatic Room Light Controller using PIR sensors
With the advancement of technology intelligent devices are fast approaching the realm of necessity from the status of luxury. With limited energy resources, it is the need of time to revolutionize the traditional methods of counting visitors inside hotels, recreational places, meeting rooms and cinemas to control the electrical appliances. Moreover, the improved living standards…
Read MoreSolar Irradiance & On Grid Solar Power Systems with Net Metering in Pakistan
This paper presents a case study of solar irradiance and scope of on-grid solar power systems with net-metering in Pakistan. Detailed analysis of solar irradiance in Pakistan is being carried out by developing the dedicated solar excel sheets. The need of on grid solar power systems for the present energy crisis in developing countries like…
Read More
