Now showing items 1-10 of 89
An Adaptive Learning Ontological Framework Based on Learning Styles and Teaching Strategies
(International Conference on Education and E-learning, 2017-09)
Ontology are increasingly being used in a variety of applications, and particularly in adaptive e-learning. They have the potential to enable developers to create adaptive course content for specified domains. E-learning ...
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
ULEARN: Personalized course Learning Objects based on Hybrid Recommendation approach
Adaptive e-learning recommender system is observed one of the exciting research discipline in the education and teaching throughout the past few decades, since, the learning style is specific for each student In reality ...
Security management for mobile ad hoc network of networks (MANoN).
(IGI Publishing, 2010)
Access control mechanism for mobile ad hoc network of networks.
(IEEE Computer Society, 2010-03)
Building CPU stubs to optimize CPU bound systems: An application of dynamic performance stubs.
Dynamic performance stubs provide a framework for the simulation of the performance behavior of software modules and functions. Hence, they can be used as an exten- sion to software performance engineering methodologies. ...
VSHDRP: Vehicle Second Heading Direction Routing Protocol in VANET
Routing protocols in VANET are considered as one of the critical dilemmas that need to be tackled, especially in sparse environment. Thus designing an efficient routing mech- anism has an impact on enhancing the network ...
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities
(EAI Transactions on Secutiry and Safety, 2015-11-28)
Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
Concurrent enforcement of usage control policies.
On Data Leakage from Non-production Systems
This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development lifecycle, non-production environments are used to serve various purposes to ...