http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Proposing a New Design Approach for M-learning Applications
Al-Harrasi, H.,Al-Khanjari,Sarrab, M. 보안공학연구지원센터 2015 International Journal of Software Engineering and Vol.9 No.11
As Information and Communication Technologies (ICT) are developing frequently, new learning approaches have been introduced to facilitate teaching and learning processes. Mobile devices are growing in popularity and there has been an increasing interest in their potential as innovative tools for learning. Mobile learning or shortly (M-learning) is a new learning approach intending to use mobile devices such as laptops, smart phones and personal digital assistant (PDA) in learning process in any place and at any time. M-learning application needs to be designed in a way that considers the special features and constraints of mobile devices such as screen size, available storage, processor speed and battery life. This paper explores the existing design approaches for M-learning and highlights their main limitations. As a step forward in this direction, this paper also proposes a new design approach for M-learning applications focusing mainly on three main aspects: learner, learning content and technology. The approach consists of three phases: starting dimensions (SD) phase, M-learning Development (MLD) phase and Learning Content Design (LCD) phase. Finally, this paper provides a case study scenario to demonstrate the feasibility of the proposed approach.
Developing Educational Mobile Application Architecture using SOA
Z. Al-Khanjari,Z. Al-Kindi,E. Al-Kindi,N. Kraiem 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.9
Mobile technologies have enormous potential to transform ordinary institutions content to electronic content. This change contributes to advance the level of performance of these institutions, whether educational or services institutions. Therefore, developing such applications using one of the well-known Software Engineering paradigms is important to support the institutions. Most of educational organizations in Oman don’t provide a clear mobile application architecture that supports different organizational services. The significant purposes of these services are to provide an environment with more malleable procedures, satisfying student’s needs, and achieving a quick access to information. Moreover, this paper proposes an extension tool to support students in all educational fields to send their appeal against exams results via a mobile application that integrates one of the well-known software architectures called Service-Oriented Architecture (SOA). In this paper, Service-Oriented Architecture for post result mobile application is used to integrate a set of services that have been implemented in a web server with the existing post result application.
Towards a Comprehensive View of Web Services QoS Models
Jokha Al-Kalbani,Naoufel Kraiem,Zuhoor Al-Khanjari,Yassine Jamoussi 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.10
In a growing web services environment, the usage, design and composition methods of web services require proper and reliable information about web services quality. Quality- of- Service (QoS) is usually referred to the non-functional characteristics of web services which can be used as an important role to differentiate between different web services. In order to select the best web services among those with similar functionality, it is important for the web requester to have a mechanism to rank them and also from the service providers side to ensure that their web services are according to the agreed QoS. Currently there is no standard manner to define the QoS characteristics of web services. Many studies have shown different categorization of QoS which led to the issue of semantic interoperability of QoS. One way to understand the QoS, is to identify all its possible requirements for web services. This paper is an attempt to explore some of the QoS issues which are essential for web services. It first proposes a QoS framework which suggests considering QoS for web services along four different views. Each view is representing a particular relevant facet of QoS models. The main contribution of this paper is to show that there is a big quantity and variety of interpretations of various service quality concepts and models and gives the reasons why there is no holistic QoS modeling approach.
Alani, A.,Al-Khanjari, Z.,Haydar Sabeeh Kalash,Alshmmary, Y. 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.4
Many security professionals know about Image Metadata, but they do not really know how it can be used to protect from the threats and prove the authenticity of these images and the most significant aspect is the anonymity of perpetrator. The novelty of this paper lies on how to use a new algorithm of Image Metadata to detect internal intrusion and how to protect it in real time inside the cloud providers. In this paper, we propose a novel algorithm to use features and characteristics technologies of Image Metadata, namely, a novel family of Intrusion Detection Systems (IDS) built on Exchangeable Image File Format (EXIF) of Image Metadata. It can assist in eliminating the anonymity advantage of perpetrator which is considered extremely important for the Digital Investigation to detect the attacker in a real time and to prove the authenticity of the images Metadata against attackers.