Pub Date : 2008-06-23DOI: 10.1109/ITI.2008.4588380
W. V. Petegem
Lifelong learning is the new adagio for modern European citizens preparing our knowledge-based society for the next decades to come. Therefore, we need open and flexible learning systems, enabling individual learning pathways for all citizens, suitable to their needs and interests at all stages of their lives. This paper will address the question how universities should support the individual citizens in their lifelong learning trajectory, by transforming learning into e-learning with the help of modern ICT, and further into a personalized way of learning, MyLearning.
{"title":"From learning over e-learning to MyLearning","authors":"W. V. Petegem","doi":"10.1109/ITI.2008.4588380","DOIUrl":"https://doi.org/10.1109/ITI.2008.4588380","url":null,"abstract":"Lifelong learning is the new adagio for modern European citizens preparing our knowledge-based society for the next decades to come. Therefore, we need open and flexible learning systems, enabling individual learning pathways for all citizens, suitable to their needs and interests at all stages of their lives. This paper will address the question how universities should support the individual citizens in their lifelong learning trajectory, by transforming learning into e-learning with the help of modern ICT, and further into a personalized way of learning, MyLearning.","PeriodicalId":261302,"journal":{"name":"International Conference on Information Technology Interfaces","volume":"229 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120930615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ITI.2008.4588479
T. Hodorogea, M. Vaida, M. Borda, Cosmin Striletchi
Java cryptographic extension (JCE) offers support for developing cryptographic package providers, allowing us to extend the JCE by implementing faster or more secure cryptographic algorithms. By the same means we shall provide our independent implementation of a DNA encryption (DNAE) system, based on the central dogma of molecular biology (CDMB). In this work we present a technical process for protecting data assets such as personal medical information using a DNA cryptography technique in which a personpsilas own blood mineral levels serve as a seed for selecting, transmitting, and recovering his sensitive personal data. As we know that the management of security keys remains a challenge, we also propose a mechanism to generate encrypt-decrypt keys by taking into consideration specifics of the cryptography method and the individualpsilas blood analysis. Our work is based on the complexity of developing, as a subset of JCE, an unconditionally secure DNAE System as part of our security provider, named DNAProvider. We intend to use DNA Provider with the DNAE System in medical applications to ensure security of medical.
{"title":"A Java Crypto implementation of DNAProvider featuring complexity in theory and practice","authors":"T. Hodorogea, M. Vaida, M. Borda, Cosmin Striletchi","doi":"10.1109/ITI.2008.4588479","DOIUrl":"https://doi.org/10.1109/ITI.2008.4588479","url":null,"abstract":"Java cryptographic extension (JCE) offers support for developing cryptographic package providers, allowing us to extend the JCE by implementing faster or more secure cryptographic algorithms. By the same means we shall provide our independent implementation of a DNA encryption (DNAE) system, based on the central dogma of molecular biology (CDMB). In this work we present a technical process for protecting data assets such as personal medical information using a DNA cryptography technique in which a personpsilas own blood mineral levels serve as a seed for selecting, transmitting, and recovering his sensitive personal data. As we know that the management of security keys remains a challenge, we also propose a mechanism to generate encrypt-decrypt keys by taking into consideration specifics of the cryptography method and the individualpsilas blood analysis. Our work is based on the complexity of developing, as a subset of JCE, an unconditionally secure DNAE System as part of our security provider, named DNAProvider. We intend to use DNA Provider with the DNAE System in medical applications to ensure security of medical.","PeriodicalId":261302,"journal":{"name":"International Conference on Information Technology Interfaces","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of communication of Croatian faculties through Facebook - Part I","authors":"A. Delic, Petra Grd, I. Gregurec","doi":"10.2498/iti.2013.0578","DOIUrl":"https://doi.org/10.2498/iti.2013.0578","url":null,"abstract":"","PeriodicalId":261302,"journal":{"name":"International Conference on Information Technology Interfaces","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123261443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge visualization in biometric face recognition on two-dimensional images","authors":"Petra Koruga, M. Baca, Tomislav Fotak","doi":"10.2498/iti.2012.0436","DOIUrl":"https://doi.org/10.2498/iti.2012.0436","url":null,"abstract":"","PeriodicalId":261302,"journal":{"name":"International Conference on Information Technology Interfaces","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}