Pub Date : 2018-01-01DOI: 10.5176/2251-3043_6.1.117
Mariia Gavriushenko, Iida Porokuokka, Oleksiy Khriyenko, T. Kärkkäinen
{"title":"On developing adaptive vocabulary learning game for children with an early language delay","authors":"Mariia Gavriushenko, Iida Porokuokka, Oleksiy Khriyenko, T. Kärkkäinen","doi":"10.5176/2251-3043_6.1.117","DOIUrl":"https://doi.org/10.5176/2251-3043_6.1.117","url":null,"abstract":"","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90060004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-01DOI: 10.5176/2251-3043_6.1.114
Oleksiy Khriyenko, Chinh Nguyen Kim, Atte Ahapainen
To smartly utilize a huge and constantly growing volume of data, improve productivity and increase competitiveness in various fields of life; human requires decision making support systems that efficiently process and analyze the data, and, as a result, significantly speed up the process. Similarly to all other areas of human life, healthcare domain also is lacking Artificial Intelligence (AI) based solution. A number of supervised and unsupervised Machine Learning and Data Mining techniques exist to help us to deal with structured data. However, in a real life, we pretty much deal with unstructured data that hides useful knowledge and valuable information inside human-readable plain texts, images, audio and video. Therefore, such IT giants as IBM, Google, Microsoft, Intel, Facebook, etc., as well as variety of SMEs are actively elaborating different Cognitive Computing services and tools to get a value from unstructured data. Thus, the paper presents feasibility study of IBM Watson cognitive computing services and tools to address the issue of automated health records processing to support doctor’s decision for patient’s driving assessment.
{"title":"Cognitive Computing supported Medical Decision Support System for Patient’s Driving Assessment","authors":"Oleksiy Khriyenko, Chinh Nguyen Kim, Atte Ahapainen","doi":"10.5176/2251-3043_6.1.114","DOIUrl":"https://doi.org/10.5176/2251-3043_6.1.114","url":null,"abstract":"To smartly utilize a huge and constantly growing volume of data, improve productivity and increase competitiveness in various fields of life; human requires decision making support systems that efficiently process and analyze the data, and, as a result, significantly speed up the process. Similarly to all other areas of human life, healthcare domain also is lacking Artificial Intelligence (AI) based solution. A number of supervised and unsupervised Machine Learning and Data Mining techniques exist to help us to deal with structured data. However, in a real life, we pretty much deal with unstructured data that hides useful knowledge and valuable information inside human-readable plain texts, images, audio and video. Therefore, such IT giants as IBM, Google, Microsoft, Intel, Facebook, etc., as well as variety of SMEs are actively elaborating different Cognitive Computing services and tools to get a value from unstructured data. Thus, the paper presents feasibility study of IBM Watson cognitive computing services and tools to address the issue of automated health records processing to support doctor’s decision for patient’s driving assessment.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72691845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-01DOI: 10.5176/2251-3043_6.1.113
Oleksiy Khriyenko
To smartly consume a huge and constantly growing volume of information, to identify fake news and resist propaganda in the context of Information Warfare, to improve personal critical thinking capabilities and increase media literacy, people require supportive environment with sophisticated technology facilitated tools. With rapid development of media, widespread popularity of social networks and fast growing amount of information distribution channels, propaganda and information warfare enter an absolutely new digital technology supported cyber era. Propaganda mining is not a trivial and very time consuming process for human. And, as with any new technology, human need certain time to understand its actual purpose, learn and adapt own behavior making consumption of a technology more valuable, beneficial and enjoyable. To make adoption faster and minimize possible harmful influence, we need to find a proper way to apply currently available technologies and knowledge for elaboration of supportive tool that helps information consumers to become more independent, insightful, and critical.
{"title":"Propaganda Barometer : A Supportive Tool to Improve Media Literacy Towards Building a Critically Thinking Society","authors":"Oleksiy Khriyenko","doi":"10.5176/2251-3043_6.1.113","DOIUrl":"https://doi.org/10.5176/2251-3043_6.1.113","url":null,"abstract":"To smartly consume a huge and constantly growing volume of information, to identify fake news and resist propaganda in the context of Information Warfare, to improve personal critical thinking capabilities and increase media literacy, people require supportive environment with sophisticated technology facilitated tools. With rapid development of media, widespread popularity of social networks and fast growing amount of information distribution channels, propaganda and information warfare enter an absolutely new digital technology supported cyber era. Propaganda mining is not a trivial and very time consuming process for human. And, as with any new technology, human need certain time to understand its actual purpose, learn and adapt own behavior making consumption of a technology more valuable, beneficial and enjoyable. To make adoption faster and minimize possible harmful influence, we need to find a proper way to apply currently available technologies and knowledge for elaboration of supportive tool that helps information consumers to become more independent, insightful, and critical.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"6 10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80377626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ongoing reform efforts and an aftermath of increasing regulation in the Swiss healthcare sector make it imperative for hospitals to develop strategies to work more efficiently and have better control over their medical, nursing, and administrative processes. In recent years, the perception, usage and efficacy of mobile devices and related services have changed. Related technologies have become potential drivers for new businesses, increased productivity, higher employee satisfaction and lower costs in IT procurement and maintenance. These endeavors make hospitals to enhance and integrate the concept of Bring Your Own Device (BYOD) in their IT environment. This work proposes a novel method for the introduction of mobile strategies with respect to closely-meshed organizational and social structures within hospitals. One key contribution of this method is its hybrid approach to combine collective know-how of existing BYOD frameworks with an iterative process model approach. The application of this BYOD framework under real-world conditions within different Swiss hospitals has led to a positive outcome whereby all hospitals concurred that the method allows for the adoption of BYOD principles while taking into consideration the individual styles and patterns of behavior. Keywords—healthcare, method, BYOD, EMM, framework
{"title":"A framework for the adoption of bring your own device (BYOD) in the hospital environment","authors":"Mike Krey","doi":"10.21256/ZHAW-3751","DOIUrl":"https://doi.org/10.21256/ZHAW-3751","url":null,"abstract":"The ongoing reform efforts and an aftermath of increasing regulation in the Swiss healthcare sector make it imperative for hospitals to develop strategies to work more efficiently and have better control over their medical, nursing, and administrative processes. In recent years, the perception, usage and efficacy of mobile devices and related services have changed. Related technologies have become potential drivers for new businesses, increased productivity, higher employee satisfaction and lower costs in IT procurement and maintenance. These endeavors make hospitals to enhance and integrate the concept of Bring Your Own Device (BYOD) in their IT environment. This work proposes a novel method for the introduction of mobile strategies with respect to closely-meshed organizational and social structures within hospitals. One key contribution of this method is its hybrid approach to combine collective know-how of existing BYOD frameworks with an iterative process model approach. The application of this BYOD framework under real-world conditions within different Swiss hospitals has led to a positive outcome whereby all hospitals concurred that the method allows for the adoption of BYOD principles while taking into consideration the individual styles and patterns of behavior. Keywords—healthcare, method, BYOD, EMM, framework","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"2009 1","pages":"77-88"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86258557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-01DOI: 10.5176/2251-3043_6.1.112
Oleksiy Khriyenko, Konsta Rönkkö, Vitalii Tsybulko, Kalle Piik, Duc Le, Tommi Riipinen
Stroke is the number two killer after heart disease since it is responsible for almost 10% of all deaths worldwide. The main problem with a stroke is a significant delay in treatment that happened mainly due to inappropriate detection of stroke symptoms or inability of a person to perform further necessary actions, and might cause death, permanent disabilities, as well as more expensive treatment and rehabilitation. Nowadays assessment of a stroke is done by human, following widely adopted FAST approach of stroke assessment. Since a human factor become one of the causes of treatment delay, offered solution will try to minimize this factor. Artificial Intelligence, Cognitive Computing, Machine Learning and Data Mining, NLP and other technologies make possible to elaborate a smart solution that enable automated stroke symptoms detection on earlier stages without self-assessment or assistance of another person, solution that in time provides notification to corresponding caregivers (family members, responsible medical worker, etc.) and even able to directly call emergency, explaining the cases and providing all necessary evidences to support further decision making. Thus, the paper presents feasibility study of IBM Watson cognitive computing services and tools to address the issue of automated stroke symptoms detection to elaborate smart supportive tool in the pocket of people under high risk of a stroke attack. Keywords— cognitive computing; medical assistant; decision support system; stroke symptoms detection; automated diagnostics; natural language processing; IBM Watson.
{"title":"Stroke Cognitive Medical Assistant (StrokeCMA)","authors":"Oleksiy Khriyenko, Konsta Rönkkö, Vitalii Tsybulko, Kalle Piik, Duc Le, Tommi Riipinen","doi":"10.5176/2251-3043_6.1.112","DOIUrl":"https://doi.org/10.5176/2251-3043_6.1.112","url":null,"abstract":"Stroke is the number two killer after heart disease since it is responsible for almost 10% of all deaths worldwide. The main problem with a stroke is a significant delay in treatment that happened mainly due to inappropriate detection of stroke symptoms or inability of a person to perform further necessary actions, and might cause death, permanent disabilities, as well as more expensive treatment and rehabilitation. Nowadays assessment of a stroke is done by human, following widely adopted FAST approach of stroke assessment. Since a human factor become one of the causes of treatment delay, offered solution will try to minimize this factor. Artificial Intelligence, Cognitive Computing, Machine Learning and Data Mining, NLP and other technologies make possible to elaborate a smart solution that enable automated stroke symptoms detection on earlier stages without self-assessment or assistance of another person, solution that in time provides notification to corresponding caregivers (family members, responsible medical worker, etc.) and even able to directly call emergency, explaining the cases and providing all necessary evidences to support further decision making. Thus, the paper presents feasibility study of IBM Watson cognitive computing services and tools to address the issue of automated stroke symptoms detection to elaborate smart supportive tool in the pocket of people under high risk of a stroke attack. Keywords— cognitive computing; medical assistant; decision support system; stroke symptoms detection; automated diagnostics; natural language processing; IBM Watson.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90860479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-05DOI: 10.5176/2251-3043_5.2.368
A. Robinson, Chris Bates
Understanding and using Design Patterns improves software quality through better comprehension of programs for both experienced developers and relative novices. Often design patterns are learned through simplified “toy” programs and exemplars that foreground the structure of the pattern. In production code the objects and methods that comprise the pattern can be hidden within a complex mesh of intra-code relationships. This paper introduces APRT, an ANTLR-based tool that recovers the structure of both static and dynamic patterns from large codebases so that they can be studied in context.
{"title":"APRT – Another Pattern Recognition Tool","authors":"A. Robinson, Chris Bates","doi":"10.5176/2251-3043_5.2.368","DOIUrl":"https://doi.org/10.5176/2251-3043_5.2.368","url":null,"abstract":"Understanding and using Design Patterns improves software quality through better comprehension of programs for both experienced developers and relative novices. Often design patterns are learned through simplified “toy” programs \u0000and exemplars that foreground the structure of the pattern. In production code the objects and methods that comprise the \u0000pattern can be hidden within a complex mesh of intra-code \u0000relationships. This paper introduces APRT, an ANTLR-based \u0000tool that recovers the structure of both static and dynamic \u0000patterns from large codebases so that they can be studied in \u0000context.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86573843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-10DOI: 10.5176/2251-3043_4.4.349
Bal Singh, P. Souza
Online communities have been proactive in producing collaborative creative content such as music, games and other social interactions. Online collaboration has enabled contributors to peer produce and share masses of creative content. Examples range from information sharing such as Wikipedia to open source software and other specific art projects. Software vendors have recently introduced low cost 2D and 3D content authoring tools allowing user communities to generate and share creative content. Emerging networking programming interfaces available inside modern game engines allow contributors to implement multiplayer or multiuser interaction relatively easily. This paper presents a 3D art creation framework to be used over networked infrastructure in a multiuser environment. Contributors will be able to create 3D sculptures at runtime, share with other users in a common networked working environment and critique each other’s work. Experimental work also involved evaluating procedurally generated meshes versus instantiation of primitive mesh objects. Saving and loading mesh information in an optimum way is also explored.
{"title":"A Game Engine based Networked Infrastructure to Create and Share 3D Abstract Art","authors":"Bal Singh, P. Souza","doi":"10.5176/2251-3043_4.4.349","DOIUrl":"https://doi.org/10.5176/2251-3043_4.4.349","url":null,"abstract":"Online communities have been proactive in producing collaborative creative content such as music, games and other social interactions. Online collaboration has enabled contributors to peer produce and share masses of creative content. Examples range from information sharing such as Wikipedia to open source software and other specific art projects. Software vendors have recently introduced low cost 2D and 3D content authoring tools allowing user communities to generate and share creative content. Emerging networking programming interfaces available inside modern game engines allow contributors to implement multiplayer or multiuser interaction relatively easily. This paper presents a 3D art creation framework to be used over networked infrastructure in a multiuser environment. Contributors will be able to create 3D sculptures at runtime, share with other users in a common networked working environment and critique each other’s work. Experimental work also involved evaluating procedurally generated meshes versus instantiation of primitive mesh objects. Saving and loading mesh information in an optimum way is also explored.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"601 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77298604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-10DOI: 10.5176/2251-3043_4.4.348
B. Al-Bayati, N. Clarke, P. Dowland
In the past few years, cloud computing has become a new paradigm for hosting and delivering services over the Internet. Customers can directly access the resources (hardware and software) of cloud computing services over the Internet without the need to have specific knowledge about the resources. This flexibility has also made cloud services more vulnerable to potential attack. A key issue is that the cloud services rely upon a simple authentication login and remain accessible to users afterward for significant periods of time. This makes cloud computing services vulnerable to misuse. Well-known service providers including Dropbox (2012) and Apple (2014) have suffered from attacks, leading to sensitive information of their customers being exposed. As a result, there is a growing need for increasing the trust among end-users and cloud service providers and to be able to continuously monitor users to identify potential misuse. User behavior profiling is one technology that has been applied with various technologies/services to provide continuous re-authentication of a user transparently in order to monitor and improve the security of a system. This paper investigates the current state of the art in this approach and examines its applicability within cloud services. A preliminary experiment is undertaken using Dropbox log data to explore the feasibility of the approach within this type cloud service. The initial analysis of the proposed approach is very encouraging and provides the basis for proposing a novel multi-level behavioural profiling architecture.
{"title":"Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis","authors":"B. Al-Bayati, N. Clarke, P. Dowland","doi":"10.5176/2251-3043_4.4.348","DOIUrl":"https://doi.org/10.5176/2251-3043_4.4.348","url":null,"abstract":"In the past few years, cloud computing has become a new paradigm for hosting and delivering services over the Internet. Customers can directly access the resources (hardware and software) of cloud computing services over the Internet without the need to have specific knowledge about the resources. This flexibility has also made cloud services more vulnerable to potential attack. A key issue is that the cloud services rely upon a simple authentication login and remain accessible to users afterward for significant periods of time. This makes cloud computing services vulnerable to misuse. Well-known service providers including Dropbox (2012) and Apple (2014) have suffered from attacks, leading to sensitive information of their customers being exposed. As a result, there is a growing need for increasing the trust among end-users and cloud service providers and to be able to continuously monitor users to identify potential misuse. User behavior profiling is one technology that has been applied with various technologies/services to provide continuous re-authentication of a user transparently in order to monitor and improve the security of a system. This paper investigates the current state of the art in this approach and examines its applicability within cloud services. A preliminary experiment is undertaken using Dropbox log data to explore the feasibility of the approach within this type cloud service. The initial analysis of the proposed approach is very encouraging and provides the basis for proposing a novel multi-level behavioural profiling architecture.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76414282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Then, B. Wallenborn, Birgit R. Ianniello, Duc Binh Vu, T. Swoboda, Michael Fuchs, M. Hemmje
This paper is concerned with several of the most important aspects of Competence-Based Learning (CBL): course authoring, assignments, and categorization of learning content. The latter is part of the so-called Bologna Process (BP) and can effectively be supported by integrating knowledge resources like, e.g., standardized skill and competence taxonomies into the target implementation approach, aiming at making effective use of an open integration architecture while fostering the interoperability of hybrid knowledge-based e-learning solutions. Modern scenarios ask for interoperable software solutions to seamlessly integrate existing e-learning infrastructures and legacy tools with innovative technologies while being cognitively efficient to handle. In this way, prospective users are enabled to use them without learning overheads. At the same time, methods of Learning Design (LD) in combination with CBL are getting more and more important for production and maintenance of easy to facilitate solutions. We present our approach of developing a competence-based course-authoring and assignment support software. It is bridging the gaps between contemporary Learning Management Systems (LMS) and established legacy learning infrastructures by embedding existing resources via Learning Tools Interoperability (LTI). Furthermore, the underlying conceptual architecture for this integration approach will be explained. In addition, a competence management structure based on knowledge technologies supporting standardized skill and competence taxonomies will be introduced. The overall goal is to develop a software solution which will not only flawlessly merge into a legacy platform and several other learning environments, but also remain intuitively usable. As a proof of concept, the so-called platform independent conceptual architecture model will be validated by a concrete use case scenario.
{"title":"A Competence-Based Course Authoring Concept for Learning Platforms with Legacy Assignment Tools","authors":"M. Then, B. Wallenborn, Birgit R. Ianniello, Duc Binh Vu, T. Swoboda, Michael Fuchs, M. Hemmje","doi":"10.5281/ZENODO.321287","DOIUrl":"https://doi.org/10.5281/ZENODO.321287","url":null,"abstract":"This paper is concerned with several of the most important aspects of Competence-Based Learning (CBL): course authoring, assignments, and categorization of learning content. The latter is part of the so-called Bologna Process (BP) and can effectively be supported by integrating knowledge resources like, e.g., standardized skill and competence taxonomies into the target implementation approach, aiming at making effective use of an open integration architecture while fostering the interoperability of hybrid knowledge-based e-learning solutions. Modern scenarios ask for interoperable software solutions to seamlessly integrate existing e-learning infrastructures and legacy tools with innovative technologies while being cognitively efficient to handle. In this way, prospective users are enabled to use them without learning overheads. At the same time, methods of Learning Design (LD) in combination with CBL are getting more and more important for production and maintenance of easy to facilitate solutions. We present our approach of developing a competence-based course-authoring and assignment support software. It is bridging the gaps between contemporary Learning Management Systems (LMS) and established legacy learning infrastructures by embedding existing resources via Learning Tools Interoperability (LTI). Furthermore, the underlying conceptual architecture for this integration approach will be explained. In addition, a competence management structure based on knowledge technologies supporting standardized skill and competence taxonomies will be introduced. The overall goal is to develop a software solution which will not only flawlessly merge into a legacy platform and several other learning environments, but also remain intuitively usable. As a proof of concept, the so-called platform independent conceptual architecture model will be validated by a concrete use case scenario.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87991131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an intelligent, light-weight, distributed and Java-based framework design for the presentation of mobile services (mServices) within a mobile eLearning (mLearning) InfoStation-based environment. The framework has been developed by incorporating inversion of control (IoC) design patterns and is maintained by a light-weight HTTP container. A multi-agent system (MAS) acts as a bridge between the mService applications and mobile users. The concept for the light-weight, intelligent and distributed design of the framework is presented.
{"title":"A Framework Design for Utilization in Facilitating Contextualised mLearning","authors":"D. Meere, Zhanlin Ji, Ivan Ganchev, M. O'Droma","doi":"10.1037/E527382013-005","DOIUrl":"https://doi.org/10.1037/E527382013-005","url":null,"abstract":"This paper presents an intelligent, light-weight, distributed and Java-based framework design for the presentation of mobile services (mServices) within a mobile eLearning (mLearning) InfoStation-based environment. The framework has been developed by incorporating inversion of control (IoC) design patterns and is maintained by a light-weight HTTP container. A multi-agent system (MAS) acts as a bridge between the mService applications and mobile users. The concept for the light-weight, intelligent and distributed design of the framework is presented.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86313061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}