103 Slices
Medium 9781601322401

A smart home for an active and independent old age in the elderly

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

251

A smart home for an active and independent old age in the elderly

Damiano Falcioni, Alberto Polzonetti, and Barbara Re

School of Science and Technology University of Camerino, Italy

Abstract – In this paper we describe the project “Private

Assisted House”. The project is intended to contribute to the diffusion of a new culture of smart home concept, that is not strictly linked to domotics in its traditional meaning, by placing the home user at the centre of the technological solutions developed. We have discussed about the reference context and about objectives and goal of the project. Finally, important question about the eco-sustainability and domotic coherence are developed. In conclusion we referred to the

SWOT analysis – a strategic planning instrument employed for the assessment of project Strengths, Weaknesses,

Opportunities and Threats.

Keywords: domotic , smart-objects, old people

1

Introduction

This project implements a model of “Private Assisted

See All Chapters
Medium 9781601322401

An Intelligent EFL Learning Platform for the Cultivation of Students’ Autonomy

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

293

An Intelligent EFL Learning Platform for the Cultivation of Students’ Autonomy

Yan Tian

School of Foreign Languages, Shanghai Jiao Tong University,

No. 800, Dongchuan Road, Minhang, Shanghai 200240, China

Abstract - English language learners need individualized guidance and effective supervision in their autonomous learning. This paper reports a study on the use of an intelligent EFL learning platform by a group of students of

English as a foreign language (EFL) in China. Via a methodology that included the survey questionnaires and open-ended oral interviews, the study examines learners’ perceptions of the use of an intelligent EFL learning platform—the Website of Shanghai Jiao Tong University

English Learning Center by a group of 80 Chinese college students learning English by themselves out of class.

of his/her online study plans and content arrangements. It is also able to automatically guide the learner to learning according to the results of his/her learning style, based on the

See All Chapters
Medium 9781601322401

Text Analysis of Deliberative Skills in Undergraduate Online Dialogue: Using L1 Regularized Logistic Regression with Psycholinguistic Features

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

����������#� ����%�������!�� ������ !����

Xiaoxi Xu, Tom Murray and Beverly Park Woolf

School of Computer Science

University of Massachusetts, Amherst, MA xiaoxi@, tmurray@, bev@cs.umass.edu

Abstract: We report on a text analysis and machine learning study of social deliberative skill using online dialogues on controversial topics from a college class. We report on our comparison between using the LIWC and Coh-Metrix text analysis feature sets, as well as demographic feature information in an L1 Regularized Logistic Regression machine learning algorithm.

Keywords: social deliberative skills, online dialogue and collaboration, machine learning, text classification

�� ���!� ����

Leaders, organizations, and nations are increasingly faced with complex issues requiring higher order thinking skills, and in particular what we call "social deliberative skills." King & Baxter [1] note that "in times of increased global interdependence, producing interculturally competent citizens who can engage in informed, ethical decision-making when confronted with problems that involve a diversity of perspectives is becoming an urgent educational priority…these skills; however, 'they are what corporations find in shortest supply among entry-level candidates' [2]." Jordan et al. [3] propose two important skill sets for skillfully addressing "complex societal issues, such as gang-related crime, deteriorating residential areas, environmental problems, long-term youth unemployment, [and] racist violence" (p. 34.) Jordan calls these skill sets "complexity awareness" and "perspective awareness," and they have significant overlap with social deliberative skills.1 Ill-defined (or "wicked") social problems are defined as: have many interacting factors; have multiple stakeholders with heterogeneous viewpoints; are chronic and, while improvable, are not completely 'solvable' in any decisive sense; and require ongoing flexible attention because conditions evolve over time [3] [4]. Though these characteristics are used to describe intransigent social problems, they define many mundane situations as well. Parenting, perusing a career, maintaining intimate relationships, planning and managing a project, and "composing a life" in such a way as to balance one's many needs and constraints—these all present one with mini wicked problems on a regular basis. They require complexity awareness and perspective awareness to address the mental and moral demands of modern life [5]. It is important that we support the development of these skills in the educational systems.

See All Chapters
Medium 9781601322401

Improving Knowledge Management in e-Learning: A Contingent Framework for Efficient Knowledge Transfer

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

17

Improving Knowledge Management in e-Learning:

A Contingent Framework for Efficient

Knowledge Transfer

1

Dr. Anitha Chennamaneni1 and Jayson G. Brown1

Computer Information Systems, Texas A&M University – Central Texas, Killeen, TX, USA

Abstract - Knowledge management (KM) is the top most important factor in e-Learning. This research paper explores the role of KM in e-Learning and develops a conceptual framework for successfully managing and transferring knowledge. We review different types of knowledge and discuss how varied KM techniques, e-Learning technologies, platforms and possible solutions improve KM and knowledge transfer in e-Learning programs. Our research framework is grounded theoretically in the knowledge creation theory and the media richness theory. This framework is extremely useful to the academicians and practitioners alike as it guides them in implementing a respectable pedagogy for effectively managing and transferring knowledge in the e-Learning environment.

See All Chapters
Medium 9781601323149

New Windows Rootkit Technologies for Enhancing Digital Rights Management in Cloud Computing Environments

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 |

139

New Windows Rootkit Technologies for Enhancing Digital

Rights Management in Cloud Computing Environments

Woei-Jiunn Tsaur and Jia-Xin Wu

Department of Information Management, Da-Yeh University, Taiwan

Abstract - With the increasing development of cloud computing technologies, digital contents such as music, movies, games, cartoon, and so on get more and more popular for entertainment, and therefore how to control and manage rights of digital contents has been becoming very critical in cloud computing environments. Sony-BMG used a rootkit to conceal the digital rights management (DRM) software, which is aptly installed in consumers’ computers to prevent unauthorized copying. In order to prevent unauthorized users from deleting the DRM software by employing anti-rootkit tools to remove the rootkit, we develop a new Windows driver-hidden rootkit to enhance DRM in cloud computing environments. The proposed Windows driver-hidden rootkit has verified that it can successfully avoid detection of a variety of well-known anti-rootkit tools in cloud computing environments. Our contributions are mainly twofold. Firstly, in cloud computing environments we can use the proposed new rootkit technology to reinforce the

See All Chapters

See All Slices