WorldWideScience

Sample records for learner control access

  1. Empowering Learners with Mobile Open-Access Learning Initiatives

    Science.gov (United States)

    Mills, Michael, Ed.; Wake, Donna, Ed.

    2017-01-01

    Education has been progressing at a rapid pace ever since educators have been able to harness the power of mobile technology. Open-access learning techniques provide more students with the opportunity to engage in educational opportunities that may have been previously restricted. "Empowering Learners with Mobile Open-Access Learning…

  2. Designing a Competence-Based Syllabus for Turkish Speaking Learners of English in Terms of Accessibility to Universal Grammar

    Science.gov (United States)

    Seker, Emrullah

    2016-01-01

    This study focuses on designing an English grammar syllabus for Turkish speaking English learners, which is based on the assumption that learning English grammar will be simpler and easier for Turkish speaking learners if it is introduced in a way by which they can achieve accessibility to Universal Grammar. In this study, I analyze almost all…

  3. Effects of Locus of Control and Learner-Control on Web-Based Language Learning

    Science.gov (United States)

    Chang, Mei-Mei; Ho, Chiung-Mei

    2009-01-01

    The study explored the effects of students' locus of control and types of control over instruction on their self-efficacy and performance in a web-based language learning environment. A web-based interactive instructional program focusing on the comprehension of news articles for English language learners was developed in two versions: learner-…

  4. Developing Testing Accommodations for English Language Learners: Illustrations as Visual Supports for Item Accessibility

    Science.gov (United States)

    Solano-Flores, Guillermo; Wang, Chao; Kachchaf, Rachel; Soltero-Gonzalez, Lucinda; Nguyen-Le, Khanh

    2014-01-01

    We address valid testing for English language learners (ELLs)--students in the United States who are schooled in English while they are still acquiring English as a second language. Also, we address the need for procedures for systematically developing ELL testing accommodations--changes in tests intended to support ELLs to gain access to the…

  5. ICT USAGE BY DISTANCE LEARNERS IN INDIA

    Directory of Open Access Journals (Sweden)

    Ashish Kumar AWADHIYA

    2014-07-01

    Full Text Available Open Universities across the world are embracing ICT based teaching and learning process to disseminate quality education to their learners spread across the globe. In India availability and access of ICT and learner characteristics are uneven and vary from state to state. Hence it is important to establish the facts about ICT access among learners, their ICT usage patterns and their readiness to use ICT for educational purpose. In view of this, a study was conducted with the objective to find out the access level of ICT among distance learners. The analysis indicates that maximum learners have desktop/laptops and most of them are accessing internet very frequently from their home. The analysis also indicates that maximum respondents are browsing social networking sites followed by educational and e-mail service providing websites. Findings suggest that there is a need to generate ICT based tutorials complemented with social networking tools and mobile applications. Study also shows that learners are equipped with mobile phones and they are browsing internet through it and also availing support services offered by the university. Hence possibility of integrating mobile phone services may be used for providing learner support services and content delivery.

  6. Cognitive Load of Learner Control: Extraneous or Germane Load?

    Directory of Open Access Journals (Sweden)

    Mieke Vandewaetere

    2013-01-01

    Full Text Available Computer-based learning environments become more tailored when learners can exert control over one or more parts of the learning process. Learner control (LC demands additional efforts of learners because, in addition to learning, they also have to monitor that learning. As a consequence, LC may cause additional cognitive load and even cognitive overload. The central question in this study is what type of cognitive load is induced by LC and whether the experienced load is related to learning outcomes. For this study, half of the students had control over task selection, while the other half had not. Within each condition, students were assigned to a single treatment, with the primary task to solely focus on the learning content, and a dual treatment, comprising a primary task and a secondary task. The results indicate that LC did not impose higher cognitive load as measured by secondary task scores and mental effort ratings.

  7. Gender Differences in Availability, Internet Access and Rate of Usage of Computers among Distance Education Learners.

    Science.gov (United States)

    Atan, Hanafi; Sulaiman, Fauziah; Rahman, Zuraidah Abd; Idrus, Rozhan Mohammed

    2002-01-01

    Explores the level of availability of computers, Internet accessibility, and the rate of usage of computers both at home and at the workplace between distance education learners according to gender. Results of questionnaires completed at the Universiti Sains Malaysia indicate that distance education reduces the gender gap. (Author/LRW)

  8. Identifiability and Accessibility in Learning Definite Article Usages: A Quasi-Experimental Study with Japanese Learners of English

    Science.gov (United States)

    Hinenoya, Kimiko; Lyster, Roy

    2015-01-01

    The present study investigated the effects of instruction on the use of the definite article "the" by Japanese learners of English by implementing two instructional treatments that varied in the extent to which they emphasized identifiability and accessibility. One instructional treatment, referred to as the traditional (TR) treatment,…

  9. ICT Usage by Distance Learners in India

    Science.gov (United States)

    Awadhiya, Ashish Kumar; Gowthaman, K.

    2014-01-01

    Open Universities across the world are embracing ICT based teaching and learning process to disseminate quality education to their learners spread across the globe. In India availability and access of ICT and learner characteristics are uneven and vary from state to state. Hence it is important to establish the facts about ICT access among…

  10. Updated Meta-Analysis of Learner Control within Educational Technology

    Science.gov (United States)

    Karich, Abbey C.; Burns, Matthew K.; Maki, Kathrin E.

    2014-01-01

    Giving a student control over their learning has theoretical and intuitive appeal, but its effects are neither powerful nor consistent in the empirical literature base. This meta-analysis updated previous meta-analytic research by Niemiec, Sikorski, and Walberg by studying the overall effectiveness of providing learner control within educational…

  11. Effectiveness of Adaptive Assessment versus Learner Control in a Multimedia Learning System

    Science.gov (United States)

    Chen, Ching-Huei; Chang, Shu-Wei

    2015-01-01

    The purpose of this study was to explore the effectiveness of adaptive assessment versus learner control in a multimedia learning system designed to help secondary students learn science. Unlike other systems, this paper presents a workflow of adaptive assessment following instructional materials that better align with learners' cognitive…

  12. External Control of Knowledge of Results: Learner Involvement Enhances Motor Skill Transfer.

    Science.gov (United States)

    Figueiredo, L S; Ugrinowitsch, H; Freire, A B; Shea, J B; Benda, R N

    2018-04-01

    Providing the learner control over aspects of practice has improved the process of motor skill acquisition, and self-controlled knowledge of results (KR) schedules have shown specific advantages over externally controlled ones. A possible explanation is that self-controlled KR schedules lead learners to more active task involvement, permitting deeper information processing. This study tested this explanatory hypothesis. Thirty undergraduate volunteers of both sexes, aged 18 to 35, all novices in the task, practiced transporting a tennis ball in a specified sequence within a time goal. We compared a high-involvement group (involvement yoked, IY), notified in advance about upcoming KR trials, to self-controlled KR (SC) and yoked KR (YK) groups. The experiment consisted of three phases: acquisition, retention, and transfer. We found both IY and SC groups to be superior to YK for transfer of learning. Postexperiment participant questionnaires confirmed a preference for receiving KR after learner-perceived good trials, even though performance on those trials did not differ from performance on trials without KR. Equivalent IY and SC performances provide support for the benefits of task involvement and deeper information processing when KR is self-controlled in motor skill acquisition.

  13. The effect of learner's control of self-observation strategies on learning of front crawl.

    Science.gov (United States)

    Marques, Priscila Garcia; Corrêa, Umberto Cesar

    2016-02-01

    This study investigated the effect of learner's control of self-observation strategies on motor skill learning. For this purpose, beginner and intermediate learner swimmers practised the front crawl. Seventy college students took part in this experiment. They comprised 40 novice learners, both male (n=19) and female (n=21), with an average age of 20.7 years (±0.44), and 30 intermediate learners, both male (n=17) and female (n=13), with an average age of 21.1 years (±0.86). The design involved a pretest (one day), four acquisition sessions (four days), and a retention test (one day). They were divided into three groups: (1) choice, which could choose to watch a video with their best or overall performance during practise; (2) yoked, which were paired to those of the choice group; and (3) control (did not watch any video). The measures included the performance of front crawl and self-efficacy. The results showed that: (1) beginners who chose a type of observation strategy had superior motor skill learning; (2) for intermediate learners, self-observation promoted better motor learning, regardless of the control of choices; (3) self-observation improved self-efficacy beliefs. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. The Effectiveness of E-Learning Systems: A Review of the Empirical Literature on Learner Control

    Science.gov (United States)

    Sorgenfrei, Christian; Smolnik, Stefan

    2016-01-01

    E-learning systems are considerably changing education and organizational training. With the advancement of online-based learning systems, learner control over the instructional process has emerged as a decisive factor in technology-based forms of learning. However, conceptual work on the role of learner control in e-learning has not advanced…

  15. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  16. Assessment concessions for learners with impairments

    African Journals Online (AJOL)

    Erna Kinsey

    Vol 25(3)185–189. Assessment ... We focus on the use of different types of assessment concessions as a basis for the development of .... to facilitate the development of meaning. .... changing the vocabulary in the test to make them more accessible to learners. .... For learners who are not able to produce recognizable words.

  17. Growing a cyber-safety culture amongst school learners in South Africa through gaming

    OpenAIRE

    Elmarie Kritzinger

    2017-01-01

    Virtually all school learners today have access to ICT devices and the internet at home or at school. More and more schools are using ICT devices to improve education in South Africa. ICT devices and internet access have enormous advantages and assist learners in learning and teachers in teaching more successfully. However, with these advantages come numerous ICT and cyber-risks and threats that can harm learners, for example cyber-bullying, identity theft and access to inappropriate material...

  18. The Outcome of Constructive Alignment between Open Educational Services and Learners' Needs, Employability and Capabilities Development: Heutagogy and Transformative Migration among Underprivileged Learners in Rwanda

    Science.gov (United States)

    Nkuyubwatsi, Bernard

    2016-01-01

    While teachers play an important role in education and supporting learning, many learners in under-resourced settings are not privileged to have access to teachers. Some of these underprivileged learners deal with the issue by engaging in self-determined and self-directed learning. Their efforts sometimes pay off with access to formal higher…

  19. Fostering learners' interaction with content: A learner-centered mobile device interface

    Science.gov (United States)

    Abdous, M.

    2015-12-01

    With the ever-increasing omnipresence of mobile devices in student life, leveraging smart devices to foster students' interaction with course content is critical. Following a learner-centered design iterative approach, we designed a mobile interface that may enable learners to access and interact with online course content efficiently and intuitively. Our design process leveraged recent technologies, such as bootstrap, Google's Material Design, HTML5, and JavaScript to design an intuitive, efficient, and portable mobile interface with a variety of built-in features, including context sensitive bookmarking, searching, progress tracking, captioning, and transcript display. The mobile interface also offers students the ability to ask context-related questions and to complete self-checks as they watch audio/video presentations. Our design process involved ongoing iterative feedback from learners, allowing us to refine and tweak the interface to provide learners with a unified experience across platforms and devices. The innovative combination of technologies built around well-structured and well-designed content seems to provide an effective learning experience to mobile learners. Early feedback indicates a high level of satisfaction with the interface's efficiency, intuitiveness, and robustness from both students and faculty.

  20. Executive functions and inhibitory control in multilingual children: evidence from second-language learners, bilinguals, and trilinguals.

    Science.gov (United States)

    Poarch, Gregory J; van Hell, Janet G

    2012-12-01

    In two experiments, we examined inhibitory control processes in three groups of bilinguals and trilinguals that differed in nonnative language proficiency and language learning background. German 5- to 8-year-old second-language learners of English, German-English bilinguals, German-English-Language X trilinguals, and 6- to 8-year-old German monolinguals performed the Simon task and the Attentional Networks Task (ANT). Language proficiencies and socioeconomic status were controlled. We found that the Simon effect advantage, reported in earlier research for bilingual children and adults over monolinguals, differed across groups, with bilinguals and trilinguals showing enhanced conflict resolution over monolinguals and marginally so over second-language learners. In the ANT, bilinguals and trilinguals displayed enhanced conflict resolution over second-language learners. This extends earlier research to child second-language learners and trilinguals, who were in the process of becoming proficient in an additional language, while corroborating earlier findings demonstrating enhanced executive control in bilinguals assumed to be caused by continuous inhibitory control processes necessary in competition resolution between two (or possibly more) languages. The results are interpreted against the backdrop of the developing language systems of the children, both for early second-language learners and for early bilinguals and trilinguals. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. Influence of Special Needs Education Policy on Access to Secondary School Education by Learners with Hearing Impairments in Nandi County, Kenya

    Science.gov (United States)

    Muhombe, Joseph Andrew; Rop, Naftali K.; Ogola, Fredrick O.; Wesonga, Justus Nyongesa

    2015-01-01

    This study sought to examine influence of Special Needs Education Policy on access to secondary school education by learners with hearing impairments in Nandi County, Kenya. The study was informed by the Multiple Intelligences theory and the Dewey theory of Progressivism. The findings showed that majority of the respondents were aware of the…

  2. EFL Instructors' Perception and Practices on Learner Autonomy in Some Turkish Universities

    Science.gov (United States)

    Dogan, Gizem; Mirici, Ismail Hakki

    2017-01-01

    Learner autonomy has become a central ability to develop in learners for a fruitful language learning/teaching process in EFL classes. Particularly, in this world of knowledge, teaching learners how to access resources and how to use them for their learning needs has become increasingly important. Teachers' perception on learner autonomy is…

  3. Exploring Learner Autonomy: Language Learning Locus of Control in Multilinguals

    Science.gov (United States)

    Peek, Ron

    2016-01-01

    By using data from an online language learning beliefs survey (n?=?841), defining language learning experience in terms of participants' multilingualism, and using a domain-specific language learning locus of control (LLLOC) instrument, this article examines whether more experienced language learners can also be seen as more autonomous language…

  4. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  5. Kokugo Dictionaries as Tools for Learners: Problems and Potential

    Directory of Open Access Journals (Sweden)

    Tom GALLY

    2012-10-01

    Full Text Available For second-language learners, monolingual dictionaries can be useful tools because they often provide more detailed explanations of meanings and more extensive vocabulary coverage than bilingual dictionaries do. While learners of English have access to many monolingual dictionaries designed specifically to meet their needs, learners of Japanese must make do with Kokugo dictionaries, that is, monolingual dictionaries intended for native Japanese speakers. This paper, after briefly describing Kokugo dictionaries in general, analyzes a typical entry from such a dictionary to illustrate the advantages and challenges of the use of Kokugo dictionaries by learners of Japanese.

  6. Making space for adult learners in higher education | Osman | South ...

    African Journals Online (AJOL)

    education and the workplace. We use adult education and social learning theories to analyse an honours programme in Journalism and Media Studies where adult learners have flourished because access has been linked to learners' motivation, mindful adaptations to the curriculum, and support from the workplace.

  7. Growing a cyber-safety culture amongst school learners in South Africa through gaming

    Directory of Open Access Journals (Sweden)

    Elmarie Kritzinger

    2017-10-01

    Full Text Available Virtually all school learners today have access to ICT devices and the internet at home or at school. More and more schools are using ICT devices to improve education in South Africa. ICT devices and internet access have enormous advantages and assist learners in learning and teachers in teaching more successfully. However, with these advantages come numerous ICT and cyber-risks and threats that can harm learners, for example cyber-bullying, identity theft and access to inappropriate material. Currently, South Africa does not have a long-term plan to grow a cyber-safety culture in its schools. This research therefore proposes a short-term initiative in the form of a game-based approach, which will assist school learners in becoming more cyber safe and teach learners about the relevant cyber-related risks and threats. The research is based on a quantitative survey that was conducted among primary school learners to establish if the game-based approach would be a feasible short-term initiative. The aim of the research is to establish if a game based approach can be used to improve cyber-safety awareness. This approach was plotted into the required ICT and cyber-safety policy required by all schools.

  8. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  9. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  10. Procedural advice on self-assessment and task selection in learner-controlled education

    NARCIS (Netherlands)

    Taminiau, Bettine; Corbalan, Gemma; Kester, Liesbeth; Van Merriënboer, Jeroen; Kirschner, Paul A.

    2011-01-01

    Taminiau, E. M. C., Corbalan, G., Kester, L., Van Merriënboer, J. J. G., & Kirschner, P. A. (2010, March). Procedural advice on self-assessment and task selection in learner-controlled education. Presentation at the ICO Springschool, Niederalteich, Germany.

  11. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  12. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  13. Can machine learning on learner analytics produce a predictive model on student performance?

    OpenAIRE

    Busch, John; Hanna, Philip; O'Neill, Ian; McGowan, Aidan; Collins, Matthew

    2017-01-01

    The aim of this research is to analysis past student learner analytics using machine learning algorithms that had undertaken a web development and programming module. By specifically using the access and error web server logs from each student web server it provides a deeper learner analytic data. The web server logs every web file access and error access from a browser so in turn each data file can directly relate to a student's engagement level and assessment strategy. Each log holds severa...

  14. Autonomy supported, learner-controlled or system-controlled learning in hypermedia environments and the influence of academic self-regulation style

    NARCIS (Netherlands)

    Gorissen, Chantal; Kester, Liesbeth; Brand-Gruwel, Saskia; Martens, Rob

    2012-01-01

    This study focuses on learning in three different hypermedia environments that either support autonomous learning, learner-controlled learning or system-controlled learning and explores the mediating role of academic self-regulation style ( ASRS; i.e., a macro level of motivation) on learning. This

  15. Autonomy supported, learner-controlled or system-controlled learning in hypermedia environments and the influence of academic self-regulation style

    NARCIS (Netherlands)

    Gorissen, Chantal J J; Kester, Liesbeth; Brand-Gruwel, Saskia; Martens, Rob

    2015-01-01

    This study focuses on learning in three different hypermedia environments that either support autonomous learning, learner-controlled learning or system-controlled learning and explores the mediating role of academic self-regulation style (ASRS; i.e. a macro level of motivation) on learning. This

  16. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  17. Universal Design for Learning: Guidelines for Accessible Online Instruction

    Science.gov (United States)

    Rogers-Shaw, Carol; Carr-Chellman, Davin J.; Choi, Jinhee

    2018-01-01

    Universal Design for Learning (UDL) is a framework for the teaching-learning transaction that conceptualizes knowledge through learner-centered foci emphasizing accessibility, collaboration, and community. Given the importance of access to achieving social justice, UDL is a promising approach to meeting all learners' needs more effectively. In…

  18. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  19. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  20. Procedural advice on self-assessment and task selection in learner-controlled education

    NARCIS (Netherlands)

    Taminiau, Bettine; Kester, Liesbeth; Corbalan, Gemma; Van Merriënboer, Jeroen; Kirschner, Paul A.

    2010-01-01

    Taminiau, E. M. C., Kester, L., Corbalan, G., Van Merriënboer, J. J. G., & Kirschner, P. A. (2010, July). Procedural advice on self-assessment and task selection in learner-controlled education. Paper presented at the Junior Researchers of EARLI Conference 2010, Frankfurt, Germany.

  1. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  2. Learners with Dyslexia: Exploring Their Experiences with Different Online Reading Affordances

    Science.gov (United States)

    Chen, Chwen Jen; Keong, Melissa Wei Yin; Teh, Chee Siong; Chuah, Kee Man

    2015-01-01

    To date, empirically derived guidelines for designing accessible online learning environments for learners with dyslexia are still scarce. This study aims to explore the learning experience of learners with dyslexia when reading passages using different online reading affordances to derive some guidelines for dyslexia-friendly online text. The…

  3. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  4. Three Concentric Circles: Young Chinese English Learners' Perceptions of Purposeful Audiences

    Science.gov (United States)

    Liu, Jack Jinghui

    2015-01-01

    English learners have more access to communicate with different purposeful audiences across the Three Concentric Circles of English (Kachu, 1985): the Inner Circle, the Outer Circle and the Expanding Circle. However, young language learners' purposeful audience as a focus of communication has not been emphasized as much as other linguistic…

  5. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  6. Autonomy Supported, Learner-Controlled or System-Controlled Learning in Hypermedia Environments and the Influence of Academic Self-Regulation Style

    Science.gov (United States)

    Gorissen, Chantal J. J.; Kester, Liesbeth; Brand-Gruwel, Saskia; Martens, Rob

    2015-01-01

    This study focuses on learning in three different hypermedia environments that either support autonomous learning, learner-controlled learning or system-controlled learning and explores the mediating role of academic self-regulation style (ASRS; i.e. a macro level of motivation) on learning. This research was performed to gain more insight in the…

  7. Universal Design for Learning (UDL) and Learners with Severe Support Needs

    Science.gov (United States)

    Hartmann, Elizabeth

    2015-01-01

    This article presents the Universal Design for Learning (UDL) framework as one way to understand how to support learners with severe disabilities and how to support their access to authentic and appropriate curricula that improves their quality of life. Two key ideas from the UDL framework, (a) understanding learner variability and (b) supporting…

  8. Technical Evaluation Report 37: Assistive Software for Disabled Learners

    Directory of Open Access Journals (Sweden)

    Jon Baggaley

    2004-11-01

    Full Text Available Previous reports in this series (#32 and 36 have discussed online software features of value to disabled learners in distance education. The current report evaluates four specific assistive software products with useful features for visually and hearing impaired learners: ATutor, ACollab, Natural Voice, and Just Vanilla. The evaluative criteria discussed include the purpose, uses, costs, and features of each software product, all considered primarily from the accessibility perspective.

  9. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  10. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  11. Accessing and assessing young learner’s mathematical dispositions

    Directory of Open Access Journals (Sweden)

    mellony Graven

    2012-07-01

    Full Text Available It is argued in this paper that there is an absence of literature relating to research on learner mathematical dispositions, particularly with young learners. Drawing on Kilpatrick, Swafford and Findell’s (2001 five interrelated strands of mathematical proficiency, which include: conceptual understanding, procedural fluency, strategic competence, adaptive reasoning and productive disposition, it is argued that there has been little engagement with productive disposition in the field of mathematics education and how we might access and assess this strand. Despite competence in all strands being essential for mathematical proficiency, literature and assessments that seek to establish learner levels of mathematical proficiency have tended to focus on the first four and have neglected the last; productive disposition. Finding ways in which to access student mathematical learning dispositions can be challenging, especially with young learners who struggle to articulate their views. An instrument is shared that the author has designed with doctoral fellow, Debbie Stott, in order to access and assess the productive disposition of learners participating in maths clubs run within the South African Numeracy Chair. The findings that emerge in one Grade 3 club with six learners is shared. These findings are related to the data collected through instruments that assess the other four strands of mathematical proficiency. This enables a holistic picture of learner’s mathematical proficiency as intended in the conceptualisation of the interrelated five strands of proficiency.

  12. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  13. Learner-Controlled Scaffolding Linked to Open-Ended Problems in a Digital Learning Environment

    Science.gov (United States)

    Edson, Alden Jack

    2017-01-01

    This exploratory study reports on how students activated learner-controlled scaffolding and navigated through sequences of connected problems in a digital learning environment. A design experiment was completed to (re)design, iteratively develop, test, and evaluate a digital version of an instructional unit focusing on binomial distributions and…

  14. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  15. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  16. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  17. Easing access for lifelong learners

    DEFF Research Database (Denmark)

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina

    2015-01-01

    developmental stages. This article maps the development in Denmark, Finland, Germany and England using a case study approach deploying data triangulation from a national and institutional perspective. It explores the extent/commonality of structural factors for easing access for students engaging in lifelong...

  18. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  19. Learners' perspectives on the provision of condoms in South African public schools.

    Science.gov (United States)

    de Bruin, W E; Panday-Soobrayan, S

    2017-12-01

    A stubborn health challenge for learners in South African public schools concerns sexual and reproductive health and rights (SRHR). In 2015, the Department of Basic Education (DBE) proposed the provision of condoms and SRHR-services to learners in schools. This study aimed to contribute to the finalisation and implementation of DBE's policy by exploring learners' perspectives on the provision of condoms and SRHR-services in schools. Sixteen focus group discussions were conducted with learners (n = 116) from 33 public schools, to assess their attitudes, social influences, and needs and desires regarding condom provision and SRHR-services in schools. The majority of learners did not support condom provision in schools as they feared that it may increase sexual activity. Contrarily, they supported the provision of other SRHR-services as clinics fail to offer youth-friendly services. Learners' sexual behaviour and access to SRHR-services are strongly determined by their social environment, including traditional norms and values, and social-pressure from peers and adults. Learners' most pressing needs and desires to access condoms and SRHR-services in school concerned respect, privacy and confidentiality of such service provision. Implementation of DBE's policy must be preceded by an evidence-informed advocacy campaign to debunk myths about the risk of increased sexual activity, to advocate for why such services are needed, to shift societal norms towards open discussion of adolescent SRHR and to grapple with the juxtaposition of being legally empowered but socially inhibited to protect oneself from HIV, STIs and early pregnancy. Provision of condoms and other SRHR-services in schools must be sensitive to learners' privacy and confidentiality to minimise stigma and discrimination.

  20. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  1. A theoretical framework for an access programme encompassing ...

    African Journals Online (AJOL)

    A theoretical framework for an access programme encompassing further education training: remedy for educational wastage? ... learners who have dropped out of school without completing their secondary-school education, there are the special needs of adult learners in the workplace that must be taken into consideration.

  2. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  3. Handing over ownership of schools to learners

    CSIR Research Space (South Africa)

    Dlodlo, N

    2012-03-01

    Full Text Available uses the concept of crowd sourcing for social activism and public accountability, serving as a model for what is coined ?activist mapping? ? the combination of social activism, citizenship and geospatial information. It uses social media and mobile... phone coverage in South Africa is fast approaching 100%. Therefore irrespective of where the school is based, the learners are more likely to have access and use the system developed. This is about bridging the digital gap in access to technology...

  4. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  5. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  6. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  7. Learners' perceptions of learners regarded as having a homosexual orientation in an independent secondary school environment.

    Science.gov (United States)

    Mostert, Hendrik P; Myburgh, Chris; Poggenpoel, Marie

    2012-10-04

    In schools today discrimination based on sexual orientation takes place on a regular basis. This form of discrimination leads to aggression towards learners perceived to be homosexual, as well as towards those with a homosexual orientation. For more than 15 years South Africa has been a democratic country with laws that protect learners who have a homosexual orientation. Nevertheless, aggression and discrimination towards these learners still occur in schools. Aggression often leads to verbal and physical bullying of the victims by perpetrators. The objectives of this research were to explore and describe Grade 11 learners' experiences of aggression towards learners perceived to be homosexual as well as those with a homosexual orientation in an independent secondary school environment. The research design was qualitative, exploratory, descriptive and contextual in nature. The data for this investigation consisted of essays based on a published newspaper photograph, phenomenological group interviews, observations and field notes. Tesch's method of data analysis was used, and an independent coder assisted. Three themes were identified, discussed and supported by a literature control: that learners experience that it is right and acceptable to have a homosexual orientation; that they experience ambivalence towards homosexual orientation of learners; and experienced feelings that it is wrong to have a homosexual orientation. Recommended guidelines are provided to address aggression towards learners perceived to be homosexual and those with a homosexual orientation.

  8. Technology in the development of learner-centric education

    CSIR Research Space (South Africa)

    Dlodlo, N

    2011-07-01

    Full Text Available . The architecture has the arduino as one of its components. The arduino is fitted with various sensors that can detect the environmental parameters. The information generated by the arduino is fed to learners' Twitter accounts which they can access via mobile phones....

  9. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  10. Advising Practices: A Survey of Self-Access Learner Motivations and Preferences

    Directory of Open Access Journals (Sweden)

    Leander S. Hughes, Nathan P. Krug, and Stacey L. Vye

    2012-06-01

    Full Text Available Based on queries from students who frequently visit the English Resource Center (ERC at Saitama University, this research team set out to examine what motivational factors encourage ERC attendees to participate for an extended period of time in the Center on a regular basis. Initial indications are that social collaborative learning amongst peers at the Center is the most significant long-term motivational factor for students to become involved with learning English in the ERC. More specifically, this study explores factors that encourage these learners to become regular and perhaps more autonomous center participants in terms of advising practices such as (a what factors led students to their initial discovery of ERC, (b what inspired that very first visit, (c what encouraged learners to continue to attend the Center on a regular basis, (d what attendees value about the ERC, and finally (e what might be done to ensure that greater support is provided for students who come to the ERC for the first time.

  11. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  12. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  13. Complexities and constraints influencing learner performance in physical science

    Directory of Open Access Journals (Sweden)

    Mavhungu Abel Mafukata

    2016-01-01

    Full Text Available This paper explores complexities and constraints affecting performance and output of physical science learners in Vhembe District, Limpopo Province, South Africa. The study was motivated by the desire of the researcher to establish, profile and characterise the complexities and constraints reminiscence of poor performance of learners in physical science as measured through end-of-year Grade 12 (final year of high school education examination results. Twenty six schools (n=26 were purposively selected from three circuits of education (n=3. From these schools, two learners were randomly selected (n=52 for interviews. In addition, two circuit managers (n=2 were conveniently selected as part of Key Informant Interviews (KII. For the Focus Group Discussions (FGDs, twelve (n=12 parents were randomly selected to form two groups of six members each. Multi-factor complexities and constraints impeding performance of learners were discovered. Intensive teacher in-service programme is recommended. Community engagement should be encouraged to educate parents on the value of involvement in the education of their children. Free access learner support structures such as Homework and Extra-lessons Assistance Centre (H&EACs should be established.

  14. Grapho-Morphological Awareness in Spanish L2 Reading: How Do Learners Use This Metalinguistic Skill?

    Science.gov (United States)

    Miguel, Nausica Marcos

    2012-01-01

    This paper contributes to the literature on the transferability of grapho-morphological awareness (GMA) for second language (L2) learners by analysing L2 learners' knowledge of morphology in reading. GMA helps readers to identify grammatical categories, infer meanings of unfamiliar words, and access stored lexical information. Previous research…

  15. Residents in difficulty—just slower learners? A case-control study

    DEFF Research Database (Denmark)

    O'Neill, Lotte; Norberg, Karen; Thomsen, Maria

    2014-01-01

    were matched for graduation year. Medical school exam failures, grades, completion time, and academic dispensations as predictors of case status were examined with conditional logistic regression. RESULTS In total 89 cases and 343 controls were identified. The total number of medical school re......-examinations and the time it took to complete medical school were significant individual predictors of subsequent difficulties (deceleration, transferral or dropout) in residency whereas average medical school grades were not. CONCLUSIONS Residents in difficulty eventually reached similar competence levels as controls...... during medical school; however, they needed more exam attempts and longer time to complete their studies, and so seemed to be slower learners. A change from “fixed-length variable-outcome programmes” to “fixed-outcome variable-length programmes” has been proposed as a way of dealing with the fact...

  16. Accessible Collaborative Learning Using Mobile Devices

    Science.gov (United States)

    Wald, Mike; Li, Yunjia; Draffan, E. A.

    2014-01-01

    This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…

  17. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  18. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  19. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  20. Learner-Controlled Self-Observation is Advantageous for Motor Skill Acquisition

    Science.gov (United States)

    Ste-Marie, Diane M.; Vertes, Kelly A.; Law, Barbi; Rymal, Amanda M.

    2013-01-01

    There were two main objectives of this research. First, we wanted to examine whether video feedback of the self (self-observation) was more effective for motor skill learning when the choice to view the video was provided to the learner (learner-controlled, LC) as opposed to an experimenter-controlled (EC) delivery. Secondly, we explored whether there were differences in the self-regulatory processes of self-efficacy and intrinsic motivation, as well as perceived choice between the LC and EC conditions. Two groups (LC and EC) of children (M age of 11.2 years; SD = 1.89) attempted to learn a progression of trampoline skills during a 2-day acquisition phase in which video self-observation was available. The second acquisition day was followed by a no self-observation retention test 1 day later. It was hypothesized that, during retention, the LC group would be more self-efficacious about their ability to progress through the trampoline skills, show greater intrinsic motivation and perceived choice, and go further in skill progression than the EC group. Analysis of the acquisition data showed the LC group had greater increases in self-efficacy as compared to the EC group. Results of the retention test showed that the participants in the LC group obtained higher scores on the intrinsic motivation and perceived choice measures and had higher skill progression scores as compared to the EC group. Regression analysis showed that group assignment and self-efficacy were significant predictors of the physical performance benefits noted in retention. These findings are discussed within Zimmerman’s (2004) self-regulation of learning model. PMID:23355826

  1. Learner-controlled self-observation is advantageous for motor skill acquisition

    Directory of Open Access Journals (Sweden)

    Diane M Ste-Marie

    2013-01-01

    Full Text Available There were two main objectives of this research. First, we wanted to examine whether video feedback of the self (self-observation was more effective for motor skill learning when the choice to view the video was provided to the learner (learner-controlled; LC as opposed to an experimenter-controlled (EC delivery. Secondly, we explored whether there were differences in the self-regulatory processes of self-efficacy and intrinsic motivation, as well as perceived choice between the LC and EC conditions. Two groups (LC and EC of children (M age of 11.2 years; SD = 1.89 attempted to learn a progression of trampoline skills during a two-day acquisition phase in which video self-observation was available. The second acquisition day was followed by a no self-observation retention test one day later. It was hypothesized that, during retention, the LC group would be more self-efficacious about their ability to progress through the trampoline skills, show greater intrinsic motivation and perceived choice, and go further in skill progression than the EC group. Analysis of the acquisition data showed the LC group had greater increases in self-efficacy as compared to the EC group. Results of the retention test showed that the participants in the LC group obtained higher scores on the intrinsic motivation and perceived choice measures and had higher skill progression scores as compared to the EC group. Regression analysis showed that group assignment and self-efficacy were significant predictors of the physical performance benefits noted in retention. These findings are discussed within Zimmerman’s (2004 self-regulation of learning model.

  2. Accessing word meaning in beginning second language learners: Lexical or conceptual mediation?

    NARCIS (Netherlands)

    Poarch, G.J.; Hell, J.G. van; Kroll, J.F.

    2015-01-01

    We tested the predictions of the Revised Hierarchical Model (Kroll & Stewart, 1994) to examine how children map novel words to concepts during early stages of L2 learning. Fifth grade Dutch L2 learners with 8 months of English instruction performed a translation recognition task followed by

  3. The role of the phonological loop in English word learning: a comparison of Chinese ESL learners and native speakers.

    Science.gov (United States)

    Hamada, Megumi; Koda, Keiko

    2011-04-01

    Although the role of the phonological loop in word-retention is well documented, research in Chinese character retention suggests the involvement of non-phonological encoding. This study investigated whether the extent to which the phonological loop contributes to learning and remembering visually introduced words varies between college-level Chinese ESL learners (N = 20) and native speakers of English (N = 20). The groups performed a paired associative learning task under two conditions (control versus articulatory suppression) with two word types (regularly spelled versus irregularly spelled words) differing in degree of phonological accessibility. The results demonstrated that both groups' recall declined when the phonological loop was made less available (with irregularly spelled words and in the articulatory suppression condition), but the decline was greater for the native group. These results suggest that word learning entails phonological encoding uniformly across learners, but the contribution of phonology varies among learners with diverse linguistic backgrounds.

  4. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  5. Treating the Non-Learner: Penicillin or Placebo?

    Science.gov (United States)

    McDonald, Carl B.; Cotroneo, Keith

    Non-learners are externally controlled students conditioned to expect both failure and success. They are aware of their basic skill deficiencies yet know that passive behavior in high school classrooms has resulted in passing grades. Given the nature of the non-learner, developmental educators cannot achieve positive results through manipulating…

  6. Executive functions and inhibitory control in multilingual children: Evidence from second-language learners, bilinguals, and trilinguals

    NARCIS (Netherlands)

    Poarch, G.J.; Hell, J.G. van

    2012-01-01

    In two experiments, we examined inhibitory control processes in three groups of bilinguals and trilinguals that differed in nonnative language proficiency and language learning background. German 5- to 8-year-old second-language learners of English, German–English bilinguals, German–English–Language

  7. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  8. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  9. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  10. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    Segalard, Jean

    1970-01-01

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  11. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Challenges of Access to Literature and Attitude among Postgraduate ...

    African Journals Online (AJOL)

    The uptake of modern technology in learning and teaching including e-learning and Open Educational Resources are still out of reach by many learners and lecturers alike. Distance learners are also faced with time constraints as they work, and many of them are very far from any access to literature. This study aimed at ...

  13. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  14. Supporting Online Learners: Blending High-Tech with High-Touch

    Science.gov (United States)

    Dolan, Sean; Donohue, Chip; Holstrom, Lisa; Pernell, Latonia; Sachdev, Anu

    2009-01-01

    Effective and easily accessible student support services are essential to the success of adult learners. A student-centered approach is especially important in the design and delivery of online courses, professional certificates, and degree programs for early childhood professionals. A student-first approach is essential for non-traditional adult…

  15. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  16. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  17. Technological Diversity: A Case Study into Language Learners' Mobile Technology Use Inside and Outside the Classroom

    Science.gov (United States)

    Brick, Billy; Cervi-Wilson, Tiziana

    2015-01-01

    The speed of technological advance in the mobile phone, netbook and tablet markets has meant that learners increasingly have access to digital devices capable of enhancing their learning experience. This case study reports on how language learners, taking Italian as an option on the Institution Wide Languages Programme (IWLP) at Coventry…

  18. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  19. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  20. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  1. Syntactic and Semantic Specifications in Online English Learners' Dictionaries

    Science.gov (United States)

    Rizo-Rodriguez, Alfonso

    2009-01-01

    Among the multifarious linguistic resources currently available on the Internet, learners of English as a foreign language, as well as teachers and translators, can effortlessly access a vast variety of electronic dictionaries well suited to a multiplicity of lookup operations. A particular kind of lexicographical work on the Web is the…

  2. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  3. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  4. The Effects of Applying Betts’ Autonomous Learner Model on Iranian Students

    Directory of Open Access Journals (Sweden)

    Nahid Yarahmadzehi

    2012-09-01

    Full Text Available Classroom-based, teacher-directed language learning has been dominant in language teaching and learning for decades; however, the notion of autonomy is not novel to language teachers. Since the publication of Holec’s book, Autonomy and Foreign Language Learning (1981, autonomy in language learning has been a significant issue for discussion in relation to language learning practices and language teaching principles. Many ESL researchers have turned their attention to learner autonomy in classroom settings; however, learner autonomy in the Iranian context within self-access settings, classroom settings, and school curriculum has not been adequately addressed in the literature. To fill the research gap mentioned above, the present study aims to determine: 1. if Betts’s Autonomous Learner Model (Betts & Kercher, 1999 has any significant effect in terms of students’ self-directed learning readiness, and 2. if Betts’s Autonomous Learner Model has any significant effect on students’ English language proficiency. Adopting a quasi-experimental design, the study involved a comparison between the experimental and the control group. Two instruments were used: Gugliemino’s (1977 Self-Directed Learning Readiness Scale (SDLRS; and standardized TOEFL test. 30 students (group A were taught English based on a pedagogical model, which blended Betts’s ALM with classroom instruction and 30 students (group B were taught through a traditional teacher-directed method. Finally, after six months of treatment, TOEFL test and SDLRS test were administered as the post-test and the results were analyzed by means of SPSS software. The results showed that ALM can work with Iranian students as evidenced by generally average performance on SDLRS and TOEFL post-tests.

  5. Motion Controllers for Learners to Manipulate and Interact with 3D Objects for Mental Rotation Training

    Science.gov (United States)

    Yeh, Shih-Ching; Wang, Jin-Liang; Wang, Chin-Yeh; Lin, Po-Han; Chen, Gwo-Dong; Rizzo, Albert

    2014-01-01

    Mental rotation is an important spatial processing ability and an important element in intelligence tests. However, the majority of past attempts at training mental rotation have used paper-and-pencil tests or digital images. This study proposes an innovative mental rotation training approach using magnetic motion controllers to allow learners to…

  6. Executive Functions and Inhibitory Control in Multilingual Children: Evidence from Second-Language Learners, Bilinguals, and Trilinguals

    Science.gov (United States)

    Poarch, Gregory J.; van Hell, Janet G.

    2012-01-01

    In two experiments, we examined inhibitory control processes in three groups of bilinguals and trilinguals that differed in nonnative language proficiency and language learning background. German 5- to 8-year-old second-language learners of English, German-English bilinguals, German-English-Language X trilinguals, and 6- to 8-year-old German…

  7. Learner Satisfaction in Online Learning: An Analysis of the Perceived Impact of Learner-Social Media and Learner-Instructor Interaction

    Science.gov (United States)

    Andersen, Jeffery C.

    2013-01-01

    The purpose of this study was to determine the relationships between general course satisfaction, learner-instructor interaction, and the learner-social media interaction scores of participants. This study used an online survey with 60 questions to gather the participants' demographic data, learner-instructor interaction data, learner-social…

  8. Seamless access to OER with mobile technologies

    NARCIS (Netherlands)

    Tabuenca, Bernardo

    2014-01-01

    This presentation provides insight on how ubiquitous technology can support lifelong learners facilitating access across context. The 3LHub tool is presented as suitable tool to scaffold personal learning ecologies.

  9. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  10. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  11. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  12. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  13. Contributory Role of Virtual Courses via Skype to Control Embarrassment of Iranian EFL Learners' Performance

    Science.gov (United States)

    Jahanbakhsh, Elham; Chalak, Azizeh

    2018-01-01

    In recent years, there has been an increasing interest in integration of technology for pedagogical purposes. The present study aimed at finding out how presentation in the frame of virtual courses can control embarrassment and shyness of Iranian EFL learners. The practical part concentrated on using Skype for the purpose of presentation in…

  14. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  15. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  16. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  17. Raising the motivation and self-esteem of all learners by creating a ...

    African Journals Online (AJOL)

    Log in or Register to get access to full text downloads. ... The learners were engaged in real-life problem-solving that revolved around their personal and ... This article also considers the essential qualities of leadership and democratic ...

  18. Learner-generated drawing for phonological and orthographic dyslexic readers.

    Science.gov (United States)

    Wang, Li-Chih; Yang, Hsien-Ming; Tasi, Hung-Ju; Chan, Shih-Yi

    2013-01-01

    This study presents an examination of learner-generated drawing for different reading comprehension subtypes of dyslexic students and control students. The participants were 22 phonological dyslexic students, 20 orthographic dyslexic students, 21 double-deficit dyslexic students, and 45 age-, gender-, and IQ-matched control students. The major evaluation tools included word recognition task, orthographic task, phonological awareness task, and scenery texts and questions. Comparisons of the four groups of students showed differences among phonological dyslexia, orthographic dyslexia, double-deficit dyslexia, and the chronological age control groups in pre- and posttest performance of scenery texts. Differences also existed in relevant questions and the effect of the learner-generated drawing method. The pretest performance showed problems in the dyslexic samples in reading the scenery texts and answering relevant questions. The posttest performance revealed certain differences among phonological dyslexia, orthographic dyslexia, double-deficit dyslexia, and the chronological age control group. Finally, all dyslexic groups obtained a great effect from using the learner-generated drawing, particularly orthographic dyslexia. These results suggest that the learner-generated drawing was also useful for dyslexic students, with the potential for use in the classroom for teaching text reading to dyslexic students. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  20. Exploring Lifelong Learners Engaged in an Astronomy-Related Massively Open Online Course

    Science.gov (United States)

    Buxner, Sanlyn; Impey, Chris David; Wenger, Matthew; Formanek, Martin; Romine, James M.

    2016-01-01

    Massively open online courses (MOOCs) are becoming increasingly popular ways to reach diverse lifelong learners all over the world. Although MOOCs resemble more formal classes (e.g. videos of content, quizzes, activities), they are often used by informal audiences from home. Recently, MOOCs have become more utilized by universities to conduct outreach as they explore how to use MOOCs to reach new potential learners. Despite the rapid adaption of MOOCs, little is known about individuals who choose to take a MOOC, how they interact with the course materials, and what motivates them to finish the course.We present results of a study of lifelong learners engaged in an astronomy "101" MOOC. Through analysis of registered learners' behaviors as well as self-reported responses to a survey about science, we were able to characterize a subset of the learners engaged in the MOOC during its first offering. Overall, 25363 learners from over 100 countries registered for the MOOC. Of those, 14900 accessed at least one part of the course. Learners were recruited to complete a survey of their knowledge and attitudes towards science. Of the learner group who opened the course, 2889 individuals completed the survey, 2465 of those were able to be linked to their usage of the MOOC through a unique identifier.Learners represented a wide-range of ages, professions, and previous science experience. The best predictors for MOOC completion were engagement in the first activity and first writing assignment and engagement in the online forum. Learners were very interested in science prior to their registration, had higher basic science knowledge that most undergraduate students enrolled in a parallel astronomy course, and used online searches and science sites to get their information about science. As we reach out to a worldwide audience to learners in these massively open online courses, understanding their motivations and behaviors will be essential. This work is helping us understand and

  1. Why Do Learners Choose Online Learning: The Learners' Voices

    Science.gov (United States)

    Ilgaz, Hale; Gulbahar, Yasemin

    2017-01-01

    Offering many advantages to adult learners, e-Learning is now being recognized--and preferred--by more and more people, resulting in an increased number of distance learners in recent years. Numerous research studies focus on learner preferences for online learning, with most converging around the individual characteristics and differences, if not…

  2. Get it together: Issues that facilitate collaboration in teams of learners in intensive care.

    Science.gov (United States)

    Conte, Helen; Jirwe, Maria; Scheja, Max; Hjelmqvist, Hans

    2016-05-01

    The study describes issues that facilitate collaboration in teams of learners in an interprofessional education unit in intensive care. A descriptive qualitative study design was applied using semi-structured interviews based on the critical incident technique and qualitative content analysis. Nineteen participants, eight learners in their specialist training, nine supervisors and two head supervisors in Sweden identified 47 incidents. Teams of learners having control was the core issue. Motivation, time, experiences and reflection were central issues for facilitating collaboration. Efficiently training teams how to collaborate requires learners having control while acting on their common understanding and supervisors taking a facilitating role supporting teams to take control of their critical analysis.

  3. Whose voice matters? Learners

    Directory of Open Access Journals (Sweden)

    Sarah Bansilal

    2010-01-01

    Full Text Available International and national mathematics studies have revealed the poor mathematics skills of South African learners. An essential tool that can be used to improve learners' mathematical skills is for educators to use effective feedback. Our purpose in this study was to elicit learners' understanding and expectations of teacher assessment feedback. The study was conducted with five Grade 9 mathematics learners. Data were generated from one group interview, seven journal entries by each learner, video-taped classroom observations and researcher field notes. The study revealed that the learners have insightful perceptions of the concept of educator feedback. While some learners viewed educator feedback as a tool to probe their understanding, others viewed it as a mechanism to get the educator's point of view. A significant finding of the study was that learners viewed educator assessment feedback as instrumental in building or breaking their self-confidence.

  4. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  5. Convergent differential regulation of parvalbumin in the brains of vocal learners.

    Directory of Open Access Journals (Sweden)

    Erina Hara

    Full Text Available Spoken language and learned song are complex communication behaviors found in only a few species, including humans and three groups of distantly related birds--songbirds, parrots, and hummingbirds. Despite their large phylogenetic distances, these vocal learners show convergent behaviors and associated brain pathways for vocal communication. However, it is not clear whether this behavioral and anatomical convergence is associated with molecular convergence. Here we used oligo microarrays to screen for genes differentially regulated in brain nuclei necessary for producing learned vocalizations relative to adjacent brain areas that control other behaviors in avian vocal learners versus vocal non-learners. A top candidate gene in our screen was a calcium-binding protein, parvalbumin (PV. In situ hybridization verification revealed that PV was expressed significantly higher throughout the song motor pathway, including brainstem vocal motor neurons relative to the surrounding brain regions of all distantly related avian vocal learners. This differential expression was specific to PV and vocal learners, as it was not found in avian vocal non-learners nor for control genes in learners and non-learners. Similar to the vocal learning birds, higher PV up-regulation was found in the brainstem tongue motor neurons used for speech production in humans relative to a non-human primate, macaques. These results suggest repeated convergent evolution of differential PV up-regulation in the brains of vocal learners separated by more than 65-300 million years from a common ancestor and that the specialized behaviors of learned song and speech may require extra calcium buffering and signaling.

  6. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  7. A Model for Scaffolding Traditional Distance Learners in Africa for ...

    African Journals Online (AJOL)

    How can we solve the lull in uptake and usage of online learning amongst traditional distance learners in Africa? Several online learning initiatives are taking place in Africa, but a critical assessment of their impact in terms of increasing access to higher education through distance learning indicates, in most cases, lack of ...

  8. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  9. Learner corpus profiles the case of Romanian learner English

    CERN Document Server

    Chitez, Madalina

    2014-01-01

    The first three chapters of the book offer relevant information on the new methodological approach, learner corpus profiling, and the exemplifying case, Romanian Learner English. The description of the Romanian Corpus of Learner English is also given special attention. The following three chapters include corpus-based frequency analyses of selected grammatical categories (articles, prepositions, genitives), combined with error analyses. In the concluding discussion, the book summarizes the features compiled as lexico-grammatical profiles.

  10. Foundation for a Time Interval Access Control Model

    National Research Council Canada - National Science Library

    Afinidad, Francis B; Levin, Timothy E; Irvine, Cynthia E; Nguyen, Thuy D

    2005-01-01

    A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph...

  11. Learner Personas in CALL

    Science.gov (United States)

    Heift, Trude

    2007-01-01

    In examining the titles of this year's conference presentations, the author noticed quite a few papers that focus on learner-specific issues, for instance, papers that address learning styles, learner needs, personality and learning, learner modeling and, more generally, pedagogical issues that deal with individual learner differences in…

  12. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  13. A Development of Game-Based Learning Environment to Activate Interaction among Learners

    Science.gov (United States)

    Takaoka, Ryo; Shimokawa, Masayuki; Okamoto, Toshio

    Many studies and systems that incorporate elements such as “pleasure” and “fun” in the game to improve a learner's motivation have been developed in the field of learning environments. However, few are the studies of situations where many learners gather at a single computer and participate in a game-based learning environment (GBLE), and where the GBLE designs the learning process by controlling the interactions between learners such as competition, collaboration, and learning by teaching. Therefore, the purpose of this study is to propose a framework of educational control that induces and activates interaction between learners intentionally to create a learning opportunity that is based on the knowledge understanding model of each learner. In this paper, we explain the design philosophy and the framework of our GBLE called “Who becomes the king in the country of mathematics?” from a game viewpoint and describe the method of learning support control in the learning environment. In addition, we report the results of the learning experiment with our GBLE, which we carried out in a junior high school, and include some comments by a principal and a teacher. From the results of the experiment and some comments, we noticed that a game may play a significant role in weakening the learning relationship among students and creating new relationships in the world of the game. Furthermore, we discovered that learning support control of the GBLE has led to activation of the interaction between learners to some extent.

  14. Learner Managed Learning: Managing To Learn or Learning To Manage?

    Science.gov (United States)

    Harrison, Roger

    2000-01-01

    In the discourse of learner self-management, learners must take responsibility for learning and are offered the possibility of individual autonomy and control. A critical perspective reveals that environmental constraints inhibit the success of technical-rational self-management techniques. An alternative view is the entrepreneurial self, a…

  15. Focus on Form, Learner Uptake and Subsequent Lexical Gains in Learners' Oral Production

    Science.gov (United States)

    Alcon-Soler, Eva

    2009-01-01

    This descriptive study reports findings on the relationship between focus on form, learner uptake and subsequent lexical gains in learners' oral production. The data for the study consisted in 17 45-minute audio-recorded teacher-led conversations, 204 learners' diaries (17 sessions x 12 learners) reporting what they had learned after each…

  16. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  17. Working with language learner histories from three perspectives: Teachers, learners and researchers

    Directory of Open Access Journals (Sweden)

    Sarah Mercer

    2013-10-01

    Full Text Available Recent developments in SLA, such as learner-centredness, social constructivism, the postmethod era, and complexity perspectives, have highlighted the need for more localized, situated understandings of teaching and learning and greater recognition of learner individuality and diversity. In this article, I suggest an effective way of meeting these needs is to employ learner histories. This powerful form of writing allows learners to use their L2 to engage in authentic, personally meaningful communication with others about their identities, experiences, perceptions and emotions related to their language learning histories. As a text type, they are able to facilitate a more holistic perspective of the learner’s life and reveal the unique interconnections that an individual makes across various domains. They also enable the situated, contextualised and dynamic nature of their learning experiences to become apparent and provide learners with a genuine, motivating purpose for writing. Exploring data generated in Austria with tertiary-level EFL learners, I seek to illustrate some of the rich potential of these text types from three perspectives, namely, those of the teacher, learner and researcher.

  18. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  19. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  20. Course-embedded student support for online English language learners

    Directory of Open Access Journals (Sweden)

    Maureen Andrade

    2014-02-01

    Full Text Available This paper describes an embedded approach to learner support in online English language courses. The support model is based on language acquisition, transactional distance, and self-regulated learning theories. Based on these theories, courses were designed to provide the interaction necessary for academic English language gains, decrease the transactional distance between the teacher and learner, and assist learners in developing the ability to control the factors that affect their learning; in other words, to be self-regulated learners. The latter is critical for those who lack the autonomy needed for successful distance learning. In this paper, three course activities are described and analyzed to demonstrate how the embedded support model responds to the needs of diverse learners and assists them in achieving identified outcomes. The courses were designed for off-site international students enrolled in traditional English-speaking higher education institutions.http://dx.doi.org/10.5944/openpraxis.6.1.90

  1. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  2. TOWARDS UNDERSTANDING THE SUCCESSFUL LEARNER: A Case Study of IGNOU

    Directory of Open Access Journals (Sweden)

    Sindhu P. NAIR

    2012-04-01

    Full Text Available The growth of enrolment in the ODL system has been considerable. However, another parameter of significance in the context of Open and Distance learning is the learner success rate. While enrolment rates have been very encouraging in distance education, the pass-out rates haven’t been similar. There is a need to focus on the dynamics involved after a learner enrols himself in an OU and what drives him to stay focussed and complete his academic pursuit successfully or alternatively what holds or slows his academic progress and eventually makes him drop out. The study highlights that there are both institution-based (that is OU-based and learner-centric factors that could facilitate learners to successfully complete their studies. There are both controllable and uncontrollable factors that affect the OU learners’ success rate. This study attempts to capture the learner-centric factors and OU-related factors that have facilitated the learners to successfully complete their study. The paper delves into those key aspects or factors which would have facilitated the passed out learners in successfully completing their programmes in the open system. The findings are of direct interest, both from an institution perspective and that of a distance learner. It provides inputs to the Open and distance learning system, towards formulating appropriate strategies that further facilitate learners to successfully pass out. Also the findings serve as indicators/guide rules for any learner in the open system.

  3. An Augmented Reality Nanomanipulator for Learning Nanophysics: The "NanoLearner" Platform

    Science.gov (United States)

    Marchi, Florence; Marliere, Sylvain; Florens, Jean Loup; Luciani, Annie; Chevrier, Joel

    The work focuses on the description and evaluation of an augmented reality nanomanipulator, called "NanoLearner" platform used as educational tool in practical works of nanophysics. Through virtual reality associated to multisensory renderings, students are immersed in the nanoworld where they can interact in real time with a sample surface or an object, using their senses as hearing, seeing and touching. The role of each sensorial rendering in the understanding and control of the "approach-retract" interaction has been determined thanks to statistical studies obtained during the practical works. Finally, we present two extensions of the use of this innovative tool for investigating nano effects in living organisms and for allowing grand public to have access to a natural understanding of nanophenomena.

  4. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  5. Engaging Physician Learners Through a Web-Based Platform: Individualized End-of-Life Education.

    Science.gov (United States)

    Bergman, Jonathan; Ballon-Landa, Eric; Lerman, Steven E; Kwan, Lorna; Bennett, Carol J; Litwin, Mark S

    2016-09-01

    Web-based modules provide a convenient and low-cost education platform, yet should be carefully designed to ensure that learners are actively engaged. In order to improve attitudes and knowledge in end-of-life (EOL) care, we developed a web-based educational module that employed hyperlinks to allow users access to auxiliary resources: clinical guidelines and seminal research papers. Participants took pre-test evaluations of attitudes and knowledge regarding EOL care prior to accessing the educational module, and a post-test evaluation following the module intervention. We recorded the type of hyperlinks (guideline or paper) accessed by learners, and stratified participants into groups based on link type accessed (none, either, or both). We used demographic and educational data to develop a multivariate mixed-effects regression analysis to develop adjusted predictions of attitudes and knowledge. 114 individuals participated. The majority had some professional exposure to EOL care (prior instruction 62%; EOL referral 53%; EOL discussion 56%), though most had no family (68%) or personal experience (51%). On bivariate analysis, non-partnered (p = .04), medical student training level (p = .03), prior palliative care referral (p = .02), having a family member (p = .02) and personal experience of EOL care (p improvements. Auxiliary resources accessible by hyperlink are an effective adjunct to web-based learning in end-of-life care. © The Author(s) 2015.

  6. An Investigation of Learner-Control Variables in Vocabulary Learning Using Traditional Instruction and Two Forms of Computer-Based Instruction.

    Science.gov (United States)

    Balajthy, Ernest

    1988-01-01

    Investigates college students' ability to monitor learner-controlled vocabulary instruction when performed in traditional workbook-like tasks and in two different computer-based formats: video game and text game exercises. Suggests that developmental reading students are unable to monitor their own vocabulary development accurately. (MM)

  7. Learner Motivation in Self-Access Language Learning

    Science.gov (United States)

    Gardner, David; Yung, Kevin W. H.

    2017-01-01

    This paper reports on the findings of a study looking at students' motivation to engage in self-access language learning (SALL) while taking an English for Academic Purposes course which contains a substantial integrated SALL component. To-date there has been limited research into the motivation of such students but it is an important area of…

  8. Young learners' use of social media for information seeking

    DEFF Research Database (Denmark)

    Hyldegård, Jette Seiden

    2015-01-01

    information seeking activities, strategies and preferences can be identified when young learners use social media for information seeking in relation to course work and other study-related work tasks? 2) What motivations can be identified among young learners for using social media for information seeking....... The reported factors motivating information seeking were convenience and easy access to information, in addition to the content associated with specific social media types. Students’ use of social media for information seeking was associated primarily with their private information landscape. Contributions......Background. Increased use of social media for information seeking and learning calls for more research and knowledge of how these emerging technologies can support students’ learning. Objectives. The focus is on recent studies of young learners’ use of social media for information seeking...

  9. Cue generation: How learners flexibly support future retrieval.

    Science.gov (United States)

    Tullis, Jonathan G; Benjamin, Aaron S

    2015-08-01

    The successful use of memory requires us to be sensitive to the cues that will be present during retrieval. In many situations, we have some control over the external cues that we will encounter. For instance, learners create shopping lists at home to help remember what items to later buy at the grocery store, and they generate computer file names to help remember the contents of those files. Generating cues in the service of later cognitive goals is a complex task that lies at the intersection of metacognition, communication, and memory. In this series of experiments, we investigated how and how well learners generate external mnemonic cues. Across 5 experiments, learners generated a cue for each target word in a to-be-remembered list and received these cues during a later cued recall test. Learners flexibly generated cues in response to different instructional demands and study list compositions. When generating mnemonic cues, as compared to descriptions of target items, learners produced cues that were more distinct than mere descriptions and consequently elicited greater cued recall performance than those descriptions. When learners were aware of competing targets in the study list, they generated mnemonic cues with smaller cue-to-target associative strength but that were even more distinct. These adaptations led to fewer confusions among competing targets and enhanced cued recall performance. These results provide another example of the metacognitively sophisticated tactics that learners use to effectively support future retrieval.

  10. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  11. Offering Remotely Triggered, Real-Time Experiments in Electrochemistry for Distance Learners

    Science.gov (United States)

    Saxena, Sachin; Satsangee, Soami P.

    2014-01-01

    Remote access to real experiments is crucial for distance learners to experience the sciences. The exploitation of technology for this purpose is advantageous in global teaching and in exchange of ideas on a single front irrespective of distance barriers. Implementation of the distance method leads to cost-effective integrated-e-learning where…

  12. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  13. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  14. The Effect of Self-Assessment on EFL Learners' Self-Efficacy

    Science.gov (United States)

    Baleghizadeh, Sasan; Masoun, Atieh

    2013-01-01

    This study investigated the continuous influence of self-assessment on EFL (English as a foreign language) learners' self-efficacy. The participants, divided into an experimental and a control group, were 57 Iranian EFL learners in an English-language institute. The participants' self-efficacy was measured through a questionnaire that was the same…

  15. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  16. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. Learner-to-learner visual acuity screening: A solution for early ...

    African Journals Online (AJOL)

    The National School Health Policy guidelines (2002) stipulate that primary school learners should have their vision, speech, hearing, mental health, teeth, ... This project created greater awareness among learners, parents and teachers ...

  18. Facilitating Second Language Learners' Listening Comprehension with Second Life and Skype

    Science.gov (United States)

    Levak, Natasha; Son, Jeong-Bae

    2017-01-01

    Learning how to comprehend while listening to a second language is often considered by learners to be a difficult process that can lead to anxiety when trying to communicate (Graham, 2006; Graham & Macaro, 2008). Computer-mediated communication (CMC) can be used to assist in increasing access to native speakers and opportunities to listen.…

  19. Special and Vulnerable Groups on Access, Success and Equity on ...

    African Journals Online (AJOL)

    Open and Distance Learning (ODL) assisted by the use of ICT, has proven to create significant opportunities for potential learners especially people with special needs including those living with disabilities and inmates to access higher education. ODL as a mode of instruction with the use of ICT can promote access to ...

  20. A brief examination of predictors of e-learning success for novice and expert learners

    Directory of Open Access Journals (Sweden)

    Emily Stark

    2013-09-01

    Full Text Available As the prevalence of e-learning continues to grow in higher education settings, so too does the need for empirical research examining the antecedents of success in this environment. Previous research has suggested some characteristics that may determine success in an online course; however, little empirical evidence exists relating potential predictors of e-learning success with actual performance outcomes, particularly for different levels of learners. Students new to college may need different kinds of support to succeed in an online course compared to students with more experience in taking college-level courses, whether online or in-class, and navigating institutional resources. A primary goal of the current study is to determine the kinds of support needed to help lower-level and upper-level learners succeed in an e-learning environment. We assess several predictors of e-learning success and compare the relative effectiveness of these characteristics across novice and expert learners. Findings suggest that for lower-level students, access to technology predicted learner performance, whereas for upper-level students, motivation and self-discipline predicted learner performance. We discuss the implications of these results for e-learning instructors, instructional designers, and knowledge management practitioners.

  1. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  2. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  3. Language and Text-to-Speech Technologies for Highly Accessible Language & Culture Learning

    Directory of Open Access Journals (Sweden)

    Anouk Gelan

    2011-06-01

    Full Text Available This contribution presents the results of the “Speech technology integrated learning modules for Intercultural Dialogue” project. The project objective was to increase the availability and quality of e-learning opportunities for less widely-used and less taught European languages using a user-friendly and highly accessible learning environment. The integration of new Text-to-Speech developments into web-based authoring software for tutorial CALL had a double goal: on the one hand increase the accessibility of e-learning packages, also for learners having difficulty reading (e.g. dyslexic learners or preferring auditory learning; on the other hand exploiting some didactic possibilities of this technology.

  4. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  5. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  6. Holistic approaches to e-learning accessibility

    Directory of Open Access Journals (Sweden)

    Lawrie Phipps

    2006-12-01

    Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.

  7. Learner's Passport

    Directory of Open Access Journals (Sweden)

    Bogdan Jug

    1996-12-01

    Full Text Available For the first time learner's passport was pre­ sented at the international conference on permanent education, taking place in Rome in December 1994. This document is not meant for students only but for the entire population. It should contain notes on any format education, additional education, working experiences, cultural activities, sport results, awards, prizes and recommen­ dations. The mission of learner's passport is to gather all documents in one place, a handy book­ let which gives one an overall view over his/her achievements. It should help personnel departments in choosing the right person for a certain job as well as indirectly stimul ate additional activities of the learner's passport holder.

  8. Principles and Procedures for Self-Access Materials

    OpenAIRE

    Brian Tomlinson

    2010-01-01

    Like all language learning materials, self-access materials need to be developed from principles driven by what is known about the needs and wants of the target users. In my view, there should be a specification of universal principles, delivery specific principles, and local principles before deciding what self-access materials to develop and how to develop them. Universal principles are principles of language acquisition and development (Tomlinson, 2007a) which are applicable to all learner...

  9. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  10. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  11. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  12. Accessing the Self in Self-Access Learning: Emotions and Feelings in Language Advising

    Directory of Open Access Journals (Sweden)

    Maria Giovanna Tassinari

    2013-12-01

    Full Text Available The importance of the affective dimension and the role of beliefs, self-efficacy and learners’ voices in language learning are recognized in the literature (Arnold, 1999; Brewer, 2006; Ogasa, 2010. Although emotions and feelings seem to play an important role in self-directed language learning (Bown & White, 2010; Candas & Eneau, 2010, little is still known about how to support the affective dimension throughout the self-directed learning process (Aoki, 1999. Clearly, the cognitive and the metacognitive, the subjective and affective dimensions of learning need to be addressed, in a self-access centre, in order to support learners on their road to autonomy. Language advising provides the appropriate arena for this. Within the professional and interpersonal relationship between advisors and learners (Ciekanski, 2007, it is easier to reflect on the affective implications of learning and to help learners to cope with them. Ongoing research into emotions and feelings in advising contexts shows that affect and subjectivity occupy a large proportion of learners’ (and advisors’ discourse. This paper makes a case for integrating reflection on the affective and subjective dimensions of learning, both in the research and in the practice of language advising.

  13. Shifting Power to the Learner

    Science.gov (United States)

    Wolf, Alison

    2010-01-01

    Decades of reform have resulted in a system of further education that treats adults like children, with limited control over the qualifications they choose to pursue. This needs to change. Money must follow learners, not government contracts, and so create a genuinely demand-led system. The author proposes new financial and regulatory structures…

  14. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  15. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  16. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  17. Modeling the effects of multicontextual physics instruction on learner expectations and understanding of force and motion systems

    Science.gov (United States)

    Deese Becht, Sara-Maria Francis

    1999-11-01

    The purpose of this study is two-fold involving both practical and theoretical modeling components. The practical component, an experiential-learning phase, investigated a study population for effects that increasing levels of multicontextual physics activities have on student understanding of Newtonian systems of motion. This contextual-learning model measured learner convictions and non-response gaps and analyzed learner response trends on context, technology, challenge, growth, and success. The theoretical component, a model-building phase, designed a dynamic-knowing model for learning along a range of experiential tasks, from low to high context, monitored for indicators of learning in science and mathematics: learner academic performance and ability, learner control and academic attitude, and a learner non- response gap. This knowing model characterized a learner's process-of-knowing on a less to more expert- like learner-response continuum using performance and perspective indices associated with level of contextual- imagery referent system. Data for the contextual-learning model were collected on 180 secondary subjects: 72 middle and 108 high, with 36 physics subjects as local experts. Subjects were randomly assigned to one of three experimental groups differing only on context level of force and motion activities. Three levels of information were presented through context-based tasks: momentum constancy as inertia, momentum change as impulse, and momentum rate of change as force. The statistical analysis used a multi-level factorial design with repeated measures and discriminate analysis of response-conviction items. Subject grouping criteria included school level, ability level in science and mathematics, gender and race. Assessment criteria used pre/post performance scores, confidence level in physics concepts held, and attitude towards science, mathematics, and technology. Learner indices were computed from logit- transforms applied to learner outcomes

  18. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  19. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  20. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  1. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  2. The Use of Computer Technology in Designing Appropriate Test Accommodations for English Language Learners

    Science.gov (United States)

    Abedi, Jamal

    2014-01-01

    Among the several forms of accommodations used in the assessment of English language learners (ELLs), language-based accommodations are the most effective in making assessments linguistically accessible to these students. However, there are significant challenges associated with the implementation of many of these accommodations. This article…

  3. Building Accessible Educational Web Sites: The Law, Standards, Guidelines, Tools, and Lessons Learned

    Science.gov (United States)

    Liu, Ye; Palmer, Bart; Recker, Mimi

    2004-01-01

    Professional education is increasingly facing accessibility challenges with the emergence of webbased learning. This paper summarizes related U.S. legislation, standards, guidelines, and validation tools to make web-based learning accessible for all potential learners. We also present lessons learned during the implementation of web accessibility…

  4. Browsing while reading: effects of instructional design and learners' prior knowledge

    Directory of Open Access Journals (Sweden)

    Theimo Müller-Kalthoff

    2006-12-01

    Full Text Available One of the key reasons that multimedia, and particularly hypertext systems, are gaining in importance is that they inspire hopes of optimizing learners' processes of knowledge construction. The present study is concerned with the respective influence of individual learner variables (i.e. particularly domain-specific prior knowledge on the use of different design attributes. Thirty-six university students worked through a hierarchically structured two-part hypertext about the psychology of memory under two experimental browsing conditions (reduced versus free browsing. Results show that deeper-level comprehension (i.e. structural knowledge was predicted by the interaction of experimental condition and prior knowledge, but that simply retaining facts was not. Participants with low prior knowledge performed better on the comprehension test if they had worked on the version with reduced access. Moreover, the version with reduced access helped to reduce feelings of disorientation. The measure of disorientation also appeared to be closely linked with the individual's computer experience, self-concept of computer ability and subject-related interest. The main implications for educational practice relate to the design of an adaptive multimedia and hypertext learning system and the successful learning with it.

  5. THE USE OF E-PORTFOLIO TO DEVELOP ENGLISH LANGUAGE LEARNERS' AUTONOMY AND INDEPENDENCE

    Directory of Open Access Journals (Sweden)

    Oksana I. Ivanova

    2017-09-01

    Full Text Available This paper discusses the findings of a research study concerning the use of e-portfolios to develop learners' autonomy and independence, from the perspectives of teachers and students participating in this study. The findings demonstrate many of the benefits of e-portfolio practice regarding learners’ increased sense of ownership, teacher and peer feedback, enriched learning experience at both individual and technological levels, enhanced opportunity for self-improvement and increased awareness of the learning process. Despite many positive aspects of e-portfolios use, the study reveals some challenges facing students, teachers and support staff, mainly connected with technical problems and Internet access, and the necessity for teachers and learners to change their roles to become more independent in the learning process. The author concludes that e-portfolio is a promising tool to stimulate and challenge students to become independent and self-regulated learners that should be implemented in English language learning at higher educational institutions.

  6. Role-Based Access Control in Retrospect

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Wieringa, Roelf J.

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of

  7. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  8. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  9. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  10. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  11. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  12. Assessing Learner Satisfaction by Simultaneously Measuring Learner Attitude, Motivation, Loyalty and Service Quality in English Academies

    Science.gov (United States)

    Huong, Vu Thi; Casadesus, Marti; Marimon, Frederic

    2017-01-01

    The aims of this study are threefold in their approach to English academy teaching: (i) to assess learner satisfaction, (ii) to assess the impact of satisfaction on loyalty and (iii) to assess the three constructs that we considered to be the antecedents of learner satisfaction: learner motivation, learner attitude and service quality. To collect…

  13. Does Multimedia Support Individual Differences?--EFL Learners' Listening Comprehension and Cognitive Load

    Science.gov (United States)

    Yang, Hui-Yu

    2014-01-01

    The present study examines how display model, English proficiency and cognitive preference affect English as a Foreign Language (EFL) learners' listening comprehension of authentic videos and cognitive load degree. EFL learners were randomly assigned to one of two groups. The control group received single coding and the experimental group received…

  14. Chinese Learners of English See Chinese Words When Reading English Words.

    Science.gov (United States)

    Ma, Fengyang; Ai, Haiyang

    2018-06-01

    The present study examines when second language (L2) learners read words in the L2, whether the orthography and/or phonology of the translation words in the first language (L1) is activated and whether the patterns would be modulated by the proficiency in the L2. In two experiments, two groups of Chinese learners of English immersed in the L1 environment, one less proficient and the other more proficient in English, performed a translation recognition task. In this task, participants judged whether pairs of words, with an L2 word preceding an L1 word, were translation words or not. The critical conditions compared the performance of learners to reject distractors that were related to the translation word (e.g., , pronounced as /bei 1/) of an L2 word (e.g., cup) in orthography (e.g., , bad in Chinese, pronounced as /huai 4/) or phonology (e.g., , sad in Chinese, pronounced as /bei 1/). Results of Experiment 1 showed less proficient learners were slower and less accurate to reject translation orthography distractors, as compared to unrelated controls, demonstrating a robust translation orthography interference effect. In contrast, their performance was not significantly different when rejecting translation phonology distractors, relative to unrelated controls, showing no translation phonology interference. The same patterns were observed in more proficient learners in Experiment 2. Together, these results suggest that when Chinese learners of English read English words, the orthographic information, but not the phonological information of the Chinese translation words is activated. In addition, this activation is not modulated by L2 proficiency.

  15. Creating and Sustaining Inclusive Instructional Settings for English Language Learners: Why, What, and How

    Science.gov (United States)

    López, Francesca; Iribarren, Jacqueline

    2014-01-01

    In this article, we provide an empirically based framework for school leaders to support the replacement of separate means of providing services for English learners (ELs) with more inclusive learning supports. The framework encompasses evidence on cultivating language proficiency, ensuring access to a high-quality curriculum, and promoting…

  16. Closing the Gap: Opportunities for Distance Education to Benefit Adult Learners in Higher Education

    Science.gov (United States)

    Carlsen, A.; Holmberg, C.; Neghina, C.; Owusu-Boampong, A.

    2016-01-01

    Distance education in higher education is a fast-growing and widespread phenomenon. As many adults are unable to participate in on-campus education, distance education offers flexible learning paths that greatly enhance accessibility to higher education. Exploring distance education's potential to increase the participation of adult learners in…

  17. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  18. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  19. Talking Science in Multilingual Contexts in South Africa: Possibilities and challenges for engagement in learners home languages in high school classrooms

    Science.gov (United States)

    Msimanga, Audrey; Lelliott, Anthony

    2014-05-01

    This paper discusses the nature of learner engagement with science content during small group discussions in which learners use their home languages. We observed that learners reverted to their home languages in small group discussions, yet very little is known about the dynamics of learner engagement when they use their home languages in classroom discussions in South Africa and elsewhere. We analysed transcripts of discussions by three small groups in a Grade 10 Chemistry class. Contrary to teachers' fears that learners may not engage meaningfully with science content when talking in their home languages, all three groups spent over 90% of discussion time on task. Learners made and supported claims, challenged each others' ideas and questioned each others' thinking. Although the levels of critique varied between the groups, there was evidence of negotiation of understandings of the concepts. We argue that use of learners' home languages for engagement with difficult concepts may be a legitimate resource for science teachers to create opportunities for learner conceptual understanding. Further research is needed to understand the dynamics of teacher and learner use of their languages in science lessons, the best teaching strategies to achieve this, how teacher educators may model these strategies without undermining the need by both parents and learners' for English language proficiency to access social goods.

  20. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  1. The Effect of Impulsivity vs. Reflectivity on Reading Comprehension of Iranian EFL Learners

    Directory of Open Access Journals (Sweden)

    Somayeh Shaban

    2017-07-01

    Full Text Available In recent years attention has been accorded to language learners’ affective factors and learning styles. Two of the significant learning styles are impulsivity and reflectivity which have not been studied as much as other styles such as introversion and extroversion. This study endeavored to find out whether or not impulsivity and reflectivity have any effect on reading comprehension of Iranian English as a Foreign Language (EFL learners. Seventy two language learners were selected from 4 intact classes out of 112 learners. Nelson proficiency test was given to the participants as homogeneity test. Next, Barrat’s (1995 impulsiveness questionnaire was given to the participants. Based on the results of the questionnaire, the participants formed 3 different groups, i.e., a reflective group (n=25, impulsive group (n=25 and a control group (n=22. The control group consisted of less impulsive and less reflective learners based on Barrat’s scale. An IELTS reading test (general module was administered to the participants. Based on the results of independent samples t-test, it was found that impulsivity and reflectivity do not have any effect on reading comprehension of Iranian EFL learners. Pedagogical implications are discussed.

  2. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  3. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  4. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  5. Pedagogical Agents as Learning Companions: Building Social Relations with Learners

    OpenAIRE

    Kim, Yanghee

    2005-01-01

    This study examined the potential of pedagogical agents as learning companions (PALs) to build social relations with learners and, consequently, to motivate learning. The study investigated the impact of PAL affect (positive vs. negative vs. neutral), PAL gender (male vs. female), and learner gender (male vs. female) on learners’ social judgments, motivation, and learning in a controlled experiment. Participants were 142 college students in a computer-literacy course. Overall, the results ind...

  6. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Science.gov (United States)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  7. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  8. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  9. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  10. An Access Control Model for the Uniframe Framework

    National Research Council Canada - National Science Library

    Crespi, Alexander M

    2005-01-01

    ... security characteristics from the properties of individual components would aid in the creation of more secure systems In this thesis, a framework for characterizing the access control properties...

  11. Accessibility Considerations for e-Learning in Ghana

    Science.gov (United States)

    Boateng, John Kwame

    2016-01-01

    This paper reports on a study that explored the best ways to design e-learning in order to provide better access for adult learners with disabilities. Two districts from the Central Region of Ghana were selected and two major research questions guided the study. The five-point Likert scale was employed between May and August of 2014. The two…

  12. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  13. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  14. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  15. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  16. Twelve tips to promote successful development of a learner performance dashboard within a medical education program.

    Science.gov (United States)

    Boscardin, Christy; Fergus, Kirkpatrick B; Hellevig, Bonnie; Hauer, Karen E

    2017-11-09

    Easily accessible and interpretable performance data constitute critical feedback for learners that facilitate informed self-assessment and learning planning. To provide this feedback, there has been a proliferation of educational dashboards in recent years. An educational (learner) dashboard systematically delivers timely and continuous feedback on performance and can provide easily visualized and interpreted performance data. In this paper, we provide practical tips for developing a functional, user-friendly individual learner performance dashboard and literature review of dashboard development, assessment theory, and users' perspectives. Considering key design principles and maximizing current technological advances in data visualization techniques can increase dashboard utility and enhance the user experience. By bridging current technology with assessment strategies that support learning, educators can continue to improve the field of learning analytics and design of information management tools such as dashboards in support of improved learning outcomes.

  17. The Relationship between Learner Autonomy and Vocabulary Learning Strategies in Iranian EFL Learners with Different Language Proficiency Level

    Directory of Open Access Journals (Sweden)

    Ebrahim Azimi Mohammad Abadi

    2013-05-01

    Full Text Available Vocabulary learning is incredibly noteworthy to English language acquisition. It is unfeasible for a learner to communicate without the required vocabulary. In high education levels, learners are habitually forced to become autonomous and make conscious effort to learn vocabulary outside of the classroom. Consequently, the autonomy of the learners plays an important role in developing and enhancing their vocabulary. Learner autonomy is a huge assistance for learners in vocabulary learning since it provides the learners with numerous diverse privileges such as independency from teacher. The researcher investigated whether there is any statistically significant relationship between learner autonomy and vocabulary learning strategies use in Iranian EFL learners with different language proficiency levels. To meet the above purpose, a total number of 190 male and female EFL learners participated in this study. The methodology underlying this study was quantitative (thorough the administration of two questionnaires and two language proficiency test – TOEFL for advanced group, and Nelson for intermediate level. The quantitative data was analyzed using a set of correlational analysis revealing a significant positive correlation between learner autonomy and vocabulary learning strategies use in high proficient group, and a significant positive relationship between these two constructs in low proficient group, however not as strong as in the advanced group.

  18. The Effects of Advance Organizers and Subtitles on EFL Learners' Listening Comprehension Skills

    Science.gov (United States)

    Yang, Hui-Yu

    2014-01-01

    The present research reports the findings of three experiments which explore how subtitles and advance organizers affect EFL learners' listening comprehension of authentic videos. EFL learners are randomly assigned to one of two groups. The control group receives no treatment and the experimental group receives the experimental conditions of one…

  19. A balanced reading programme for Grade One and Two learners of English as a first and as additional language

    Directory of Open Access Journals (Sweden)

    Wildsmith-Cromarty, Rosemary

    2006-12-01

    Full Text Available This study reports on a balanced reading programme (BRP designed for a multi-cultural, South African classroom at the Foundation Phase. The BRP uses the mother tongue as a valuable resource to access meaning within a supportive learning environment. The main focus of the study is on the achievements of six Zulu children with differing levels of literacy potential after exposure to a year-long balanced approach to literacy. The study also examines parents’ views on the BRP and their perceptions of the reading process. Data were drawn from the following sources: teacher observations and interactions with learners; semi-structured interviews with parents; analysis of learner assessments and parental questionnaires. It seems that the BRP enhances both the self-confidence and cognitive growth of EAL learners. It also seems that collaborative, interactive learning, extensive independent reading, a language experience approach, home and community support and high teacher expectations of learners, combined with high levels of intrinsic learner motivation can positively impact on EAL learners’ academic progress and social growth at school.

  20. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  1. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  2. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  3. Effects of Dicto-Comp and Dictation on the Writing Skill of Female Adult Iranian EFL Learners

    Science.gov (United States)

    Adel, Rahil; Hashemian, Mahmood

    2015-01-01

    This study was an attempt to clarify and remind L2 learners/teachers of 2 kinds of writing: dicto-comp and dictation. We explored the effect of controlled writing on the accuracy of the writing of adult Iranian EFL learners. Prior to the study, the homogeneity of 30 adult EFL learners was checked through an OPT test. Thirty participants were…

  4. Interactive Exhibits Foster Partnership and Engage Diverse Learners at Their Local Libraries

    Science.gov (United States)

    LaConte, K.; Dusenbery, P.; Fitzhugh, G.; Harold, J. B.; Holland, A.

    2016-12-01

    Learners frequently need to access increasingly complex information to help them understand our changing world. More and more libraries are transforming themselves into places where learners not only access STEM information, but interact with professionals and undertake hands-on learning. Libraries are beginning to position themselves as part of learning ecosystems that contribute to a collective impact on the community. Traveling STEM exhibits are catalyzing these partnerships and engaging students, families, and adults in repeat visits through an accessible venue: their public library. The impact of the STAR Library Education Network's (STAR_Net) Discover Earth: A Century of Change exhibit on partnerships, the circulation of STEM resources, and the engagement of learners was studied by an external evaluation team. The STAR_Net project's summative evaluation utilized mixed methods to investigate project implementation and its outcomes. Methods included pre- and post-exhibit surveys administered to staff from each library that hosted the exhibits; interviews with staff from host libraries; patron surveys; exhibit-related circulation records; web metrics regarding the online STAR_Net community of practice; and site visits. A subset of host libraries recruited professionals, who delivered programming that connected Earth systems science, weather, climate, and conservation themes from the exhibit to local issues. Library patrons improved their knowledge about STEM topics presented in the exhibits and associated programming, and patrons viewing the exhibit reflected the demographics of their communities. In a follow-up survey, patrons reported spending an average of 60 minutes looking at the exhibit over their cumulative visits to the library. In contrast, visitors might visit a museum only once to look at a comparably-sized traveling exhibit due to barriers such as cost and distance. Exhibit host libraries reported an increase in the circulation of Earth science

  5. Developing the master learner: applying learning theory to the learner, the teacher, and the learning environment.

    Science.gov (United States)

    Schumacher, Daniel J; Englander, Robert; Carraccio, Carol

    2013-11-01

    As a result of the paradigm shift to a competency-based framework, both self-directed lifelong learning and learner-centeredness have become essential tenets of medical education. In the competency-based framework, learners drive their own educational process, and both learners and teachers share the responsibility for the path and content of learning. This learner-centered emphasis requires each physician to develop and maintain lifelong learning skills, which the authors propose culminate in becoming a "master leaner." To better understand the development of these skills and the attainment of that goal, the authors explore how learning theories inform the development of master learners and how to translate these theories into practical strategies for the learner, the teacher, and the learning environment so as to optimize this development.The authors begin by exploring self-determination theory, which lays the groundwork for understanding the motivation to learn. They next consider the theories of cognitive load and situated cognition, which inform the optimal context and environment for learning. Building from this foundation, the authors consider key educational theories that affect learners' abilities to serve as primary drivers of their learning, including self-directed learning (SDL); the self-assessment skills necessary for SDL; factors affecting self-assessment (self-concept, self-efficacy, illusory superiority, gap filling); and ways to mitigate the inaccuracies of self-assessment (reflection, self-monitoring, external information seeking, and self-directed assessment seeking).For each theory, they suggest practical action steps for the learner, the teacher, and the learning environment in an effort to provide a road map for developing master learners.

  6. Access and Social Capital: A Profile of Community College and Global Counterparts

    Directory of Open Access Journals (Sweden)

    Rosalind Latiner Raby

    2014-12-01

    Full Text Available Alternatives to the traditional four-year public and private university include a sector of higher education that offers a more advanced curriculum than secondary school and serves as a local and often lower-cost pathway that gives options for university overflow for adult learners, displaced workers, life-long learners, workforce learners, developmental learners, and non-traditional learners (Raby and Valeau 2009. These institutional types are known by several names including College of Further Education, Community College, Polytechnic, Technical College, and Technical and Further Education (TAFE and are found on all continents. Based on a literature review of 1,083 academic publications these institutions share a mission that views educational access as necessary for growing the economic and social capital that is needed to help students improve lives. Central to this mission is the belief that any amount of post-secondary education is life-enhancing, regardless of length of study or level of completion. This article examines application of this mission at community colleges and global counterparts throughout the world.

  7. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  8. Learner-Generated Noticing Behavior by Novice Learners: Tracing the Effects of Learners' L1 on Their Emerging L2

    Science.gov (United States)

    Park, Eun Sung

    2013-01-01

    This study examines novice learners' self-generated input noticing approaches and strategies. It is motivated by previous research on input enhancement which yielded insights that learners are naturally prone to notice certain aspects of L2 input on their own without any external means to channel their attention. Two L1 groups (Japanese and…

  9. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  10. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  11. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  12. A New Approach of an Intelligent E-Learning System Based on Learners' Skill Level and Learners' Success Rate

    Science.gov (United States)

    Mohamed, Hafidi; Lamia, Mahnane

    2015-01-01

    Learners usually meet cognitive overload and disorientation problems when using e-learning system. At present, most of the studies in e-learning either concentrate on the technological aspect or focus on adapting learner's interests or browsing behaviors, while, learner's skill level and learners' success rate is usually neglected. In this paper,…

  13. ECG Rhythm Analysis with Expert and Learner-Generated Schemas in Novice Learners

    Science.gov (United States)

    Blissett, Sarah; Cavalcanti, Rodrigo; Sibbald, Matthew

    2015-01-01

    Although instruction using expert-generated schemas is associated with higher diagnostic performance, implementation is resource intensive. Learner-generated schemas are an alternative, but may be limited by increases in cognitive load. We compared expert- and learner-generated schemas for learning ECG rhythm interpretation on diagnostic accuracy,…

  14. 41 CFR 50-202.3 - Learners, student learners, apprentices, and handicapped workers.

    Science.gov (United States)

    2010-07-01

    ... than the minimum wage prescribed in § 50-202.2 to the same extent such employment is permitted under... Management Other Provisions Relating to Public Contracts PUBLIC CONTRACTS, DEPARTMENT OF LABOR 202-MINIMUM WAGE DETERMINATIONS Groups of Industries § 50-202.3 Learners, student learners, apprentices, and...

  15. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  16. The Effect of Using Video Technology on Improving Reading Comprehension of Iranian Intermediate EFL Learners

    Directory of Open Access Journals (Sweden)

    Amir Mohammadian

    2018-04-01

    Full Text Available With the development of educational technology, the concept of technology-enhanced multimedia instructions is using widely in the educational settings. Technology can be employed in teaching different skills such as listening, reading, speaking and writing. Among these skills, reading comprehension is the skill in which EFL learners have some problems to master. Regarding this issue, the present study aimed at investigating the effect of video materials on improving reading comprehension of Iranian intermediate EFL learners. A Longman Placement Test was administered to 30 EFL learners to ensure that learners are at the same level of proficiency. The students were chosen from the state high schools in Chabahar.  The participants were regarded as intermediate learners and were divided into two groups (one experimental group and one control group. Then, a pre-test of reading comprehension was administered to assess the participants’ reading comprehension. The participants of experimental group used video files to improve their reading comprehension while the control group received conventional approaches of teaching reading comprehension. Finally, all the participants were assigned a 40-item multiple-choice reading comprehension post-test. The results of the study indicated that video materials had a significant effect on promoting reading comprehension of Iranian intermediate EFL learners (p = .000, <.05.

  17. Connected minds technology and today's learners

    CERN Document Server

    Pedrò, Francesc

    2012-01-01

    In all OECD countries, digital media and connectedness are integral to the lives of todays learners. It is often claimed that these learners are ""new millennium learners"", or ""digital natives"", who have different expectations about education. This book contributes to the debate about the effects of technology attachment and connectedness on todays learners, and their expectations about teaching. The book sets out to answer the following questions: Can the claim that todays students are ""new millenium learners"" or ""digital natives be sustained empirically? Is there consistent research evidence demonstrating the effects of technology on cognitive development, social values, and learning expectations? What are the implications for educational policy and practice?

  18. Multidimensional Learner Model In Intelligent Learning System

    Science.gov (United States)

    Deliyska, B.; Rozeva, A.

    2009-11-01

    The learner model in an intelligent learning system (ILS) has to ensure the personalization (individualization) and the adaptability of e-learning in an online learner-centered environment. ILS is a distributed e-learning system whose modules can be independent and located in different nodes (servers) on the Web. This kind of e-learning is achieved through the resources of the Semantic Web and is designed and developed around a course, group of courses or specialty. An essential part of ILS is learner model database which contains structured data about learner profile and temporal status in the learning process of one or more courses. In the paper a learner model position in ILS is considered and a relational database is designed from learner's domain ontology. Multidimensional modeling agent for the source database is designed and resultant learner data cube is presented. Agent's modules are proposed with corresponding algorithms and procedures. Multidimensional (OLAP) analysis guidelines on the resultant learner module for designing dynamic learning strategy have been highlighted.

  19. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future beh...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  20. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  1. Digital gaming and second language development: Japanese learners interactions in a MMORPG

    Directory of Open Access Journals (Sweden)

    Mark Peterson

    2011-04-01

    Full Text Available Massively multiplayer online role-playing games (MMORPGs are identified as valuable arenas for language learning, as they provide access to contexts and types of interaction that are held to be beneficial in second language acquisition research. This paper will describe the development and key features of these games, and explore claims made regarding their value as environments for language learning. The discussion will then examine current research. This is followed by an analysis of the findings from an experimental qualitative study that investigates the interaction and attitudes of Japanese English as a foreign language learners who participated in MMORPG-based game play. The analysis draws attention to the challenging nature of the communication environment and the need for learner training. The findings indicate that system management issues, proficiency levels, the operation of affective factors, and prior gaming experiences appeared to influence participation. The data shows that for the intermediate learners who were novice users, the interplay of these factors appeared to restrict opportunities to engage in beneficial forms of interaction. In a positive finding, it was found that the intermediate and advanced level participants effectively utilized both adaptive and transfer discourse management strategies. Analysis reveals they took the lead in managing their discourse, and actively engaged in collaborative social interaction involving dialog in the target language. Participant feedback suggests that real time computer-based nature of the interaction provided benefits. These include access to an engaging social context, enjoyment, exposure to new vocabulary, reduced anxiety, and valuable opportunities to practice using a foreign language. This paper concludes by identifying areas of interest for future research.

  2. Effective instruction for English learners.

    Science.gov (United States)

    Calderón, Margarita; Slavin, Robert; Sánchez, Marta

    2011-01-01

    The fastest-growing student population in U.S. schools today is children of immigrants, half of whom do not speak English fluently and are thus labeled English learners. Although the federal government requires school districts to provide services to English learners, it offers states no policies to follow in identifying, assessing, placing, or instructing them. Margarita Calderón, Robert Slavin, and Marta Sánchez identify the elements of effective instruction and review a variety of successful program models. During 2007-08, more than 5.3 million English learners made up 10.6 percent of the nation's K-12 public school enrollment. Wide and persistent achievement disparities between these English learners and English-proficient students show clearly, say the authors, that schools must address the language, literacy, and academic needs of English learners more effectively. Researchers have fiercely debated the merits of bilingual and English-only reading instruction. In elementary schools, English learners commonly receive thirty minutes of English as a Second Language (ESL) instruction but attend general education classes for the rest of the day, usually with teachers who are unprepared to teach them. Though English learners have strikingly diverse levels of skills, in high school they are typically lumped together, with one teacher to address their widely varying needs. These in-school factors contribute to the achievement disparities. Based on the studies presented here, Calderón, Slavin, and Sánchez assert that the quality of instruction is what matters most in educating English learners. They highlight comprehensive reform models, as well as individual components of these models: school structures and leadership; language and literacy instruction; integration of language, literacy, and content instruction in secondary schools; cooperative learning; professional development; parent and family support teams; tutoring; and monitoring implementation and outcomes

  3. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  4. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  5. Teaching and Learning Against all Odds: A Video-Based Study of Learner-to-Instructor Interaction in International Distance Education

    Directory of Open Access Journals (Sweden)

    Jean-Marie Muhirwa

    2009-09-01

    Full Text Available Distance education and information and communication technologies (ICTs have been marketed as cost-effective ways to rescue struggling educational institutions in developing countries, particularly in sub-Saharan Africa (SSA. This study uses classroom video analysis and follow-up interviews with teachers, students, and local tutors to analyse the interaction at a distance between learners in Mali and Burkina Faso and their French and Canadian instructors. Findings reveal multiple obstacles to quality interaction: frequent Internet disconnections, limited student access to computers, lack of instructor presence, ill-prepared local tutors, student unfamiliarity with typing and computer technology, ineffective technical support, poor social dynamics, learner-learner conflict, learner-instructor conflict, and student withdrawal and resignation. In light of the near death of the costly World Bank-initiated African Virtual University (AVU, this paper concludes by re-visiting the educational potential of traditional technologies, such as radio and video, to foster development in poor countries.

  6. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  7. Increasing Access to Learning for the Adult Basic Education Learner with Learning Disabilities: Evidence-Based Accommodation Research

    Science.gov (United States)

    Gregg, Noel

    2012-01-01

    Accommodating adult basic education (ABE) learners with learning disabilities (LD) is common practice across many instructional, testing, and work settings. However, the results from this literature search indicate that very few empirically based studies are available to support or reject the effectiveness of a great deal of accommodation…

  8. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  9. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  10. Chinese English Learners' Strategic Competence.

    Science.gov (United States)

    Wang, Dianjian; Lai, Hongling; Leslie, Michael

    2015-12-01

    The present study aims to investigate Chinese English learners' ability to use communication strategies (CSs). The subjects are put in a relatively real English referential communication setting and the analyses of the research data show that Chinese English learners, when encountering problems in foreign language (FL) communication, are characterized by the frequent use of substitution, approximation, circumlocution, literal translation, exemplification, word-coinage, repetition, and the infrequent use of cultural-knowledge and paralinguistic CSs. The rare use of paralinguistic strategies is found to be typical of Chinese English learners. The high frequency of literal translation, one first language (L1)-based strategy in our study sample, suggests that FL learners' use of L1-based CSs may depend more upon the developmental stage of their target language than the typology distance between L1 and the target language. The frequency of repetition reveals one fact that the Chinese English learners lack variety and flexibility in their use of CSs. Based on these findings, it was indicated that learners' use of CSs is influenced by a variety of factors, among which the development stage of their interlanguage and their cultural background are identified as two important factors. Some implications are finally suggested for the English foreign language teaching practice in China.

  11. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  12. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  13. What Is This Thing Called Learner's Lexicography?

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2010-01-01

    Learner lexicography as a research area has attracted increased attention during the past decades, but what is actually the true nature of learner lexicography? This question calls for a complex answer. Learner lexicography has as its objective to develop principles that help practitioners......, namely its functions, data and structures, as this strengthens the basis of learner lexicography because it leads to a proper study and understanding of the competences and needs of learners. Finally, the modern theory of dictionary functions encourages theoretical and practical lexicographers to adopt...

  14. The Effect of Problem Solving Task on Critical Reading of Intermediate EFL Learners in Iranian Context

    Directory of Open Access Journals (Sweden)

    Masoud Khalili Sabet

    2017-12-01

    Full Text Available The attempt in this study is to investigate the effect of teaching critical thinking through problem solving on  reading comprehension performance of EFL intermediate learners. In so doing, forty including twenty male and twenty female intermediate students studying English in an institute in Ardabil, Iran, were selected based on their scores on Preliminary English Test and assigned into control and experimental groups. Afterwards, the sample TOEFL reading comprehension pre-test was administered to both of these groups to ensure homogeneity. The learners in experimental group were taught through problem solving instruction and the learners in control group were taught through traditional method of instructing reading comprehension. After ten sessions of instruction, the same sample TOEFL reading comprehension as post-test was given to the learners to measure the possible differences between pre-test and post-test. The finding revealed teaching problem solving had statistically significant effect on EFL learners reading comprehension performance. Conclusion can be drawn to confirm that teaching critical thinking through problem solving bring better understanding of the text.

  15. Web 2.0 Sites for Collaborative Self-Access: The Learning Advisor vs. Google®

    Directory of Open Access Journals (Sweden)

    Craig D. Howard

    2011-09-01

    Full Text Available While Web 2.0 technologies provide motivated, self-access learners with unprecedented opportunities for language learning, Web 2.0 designs are not of universally equal value for learning. This article reports on research carried out at Indiana University Bloomington using an empirical method to select websites for self-access language learning. Two questions related to Web 2.0 recommendations were asked: (1 How do recommended Web 2.0 sites rank in terms of interactivity features? (2 How likely is a learner to find highly interactive sites on their own? A list of 20 sites used for supplemental and self-access activities in language programs at five universities was compiled and provided the initial data set. Purposive sampling criteria revealed 10 sites truly represented Web 2.0 design. To address the first question, a feature analysis was applied (Herring, The international handbook of internet research. Berlin: Springer, 2008. An interactivity framework was developed from previous research to identify Web 2.0 design features, and sites were ranked according to feature quantity. The method used to address the second question was an interconnectivity analysis that measured direct and indirect interconnectivity within Google results. Highly interactive Web 2.0 sites were not prominent in Google search results, nor were they often linked via third party sites. It was determined that, using typical keywords or searching via blogs and recommendation sites, self-access learners were highly unlikely to find the most promising Web 2.0 sites for language learning. A discussion of the role of the learning advisor in guiding Web 2.0 collaborative self-access, as well as some strategic short cuts to quick analysis, conclude the article.

  16. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  17. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  18. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  19. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  20. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  1. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  2. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  3. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  5. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  6. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  7. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  8. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  9. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  10. Teachers of adults as learners

    DEFF Research Database (Denmark)

    Lund Larsen, Lea

    This poster is a part of an on-going qualitative empirical research project: “Teachers of adults as learners. A study on teachers’ experiences in practice”. Adult learners have particular needs and characteristics that their teachers must be able to address. Some of the competencies that teachers...... need can be taught in formal settings, but in most teaching settings, the teachers act alone and develop their pedagogical approaches/-teaching strategies with no synchronous sparring from a colleague. Adult learners have particular needs and characteristics that their teachers must be able to address...... (cf. Knowles, Brookfield, Illeris, Lawler, King, Wahlgreen). If we study adult teachers as learners in practice, we may be able to identify what the teachers’ practice requires, and thereby qualify the efforts of teacher educators....

  11. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  12. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  13. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  14. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  15. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  16. Emotional Intelligence of Self Regulated Learners

    Science.gov (United States)

    Rathore, Ami

    2018-01-01

    The study was conducted on self regulated learners of senior secondary school. The main objectives of the study were to find out significant dimensions of emotional intelligence held by self regulated learners. To compare the emotional intelligence dimensions of self regulated learners, in terms of subject and gender. To find out the relationship…

  17. The Perceived Influence of School Leadership on Learner Behaviour in a Namibian Secondary School

    Science.gov (United States)

    Smith, Clive; Amushigamo, Angelina

    2016-01-01

    Despite the deeply entrenched belief in and practice of corporal punishment to maintain learner control in schools, a secondary school in Namibia has for a number of years proven to be an exception to this practice. This is an interpretive account of the teachers' and learners' experiences and perceptions of the influence of their school…

  18. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  19. The effect of technology on learner attention and achievement in the classroom

    Directory of Open Access Journals (Sweden)

    G Bester

    2013-01-01

    Full Text Available The objective of this investigation was to determine the effect of technology on attention and achievement within a classroom context, taking motivation and concentration into account as well. Lessons in Geography, English and Mathematics were presented to an experimental and a control group consisting of 23 and 22 Grade 8 learners, respectively. Technology was implemented for the experimental group but not for the control group. Significant differences were found between the average achievements of a group of learners, exposed to technology during a lesson, compared to a group not exposed to technology. Significant differences were also found between the average attention of a group of learners, exposed to technology during a lesson, compared to a group not exposed to technology. A high positive relationship was obtained between motivation and concentration and moderate to high positive correlations were obtained between attention, concentration and motivation, taken jointly as independent variables and achievement as the dependent variable.

  20. Assessing Efficiency of Prompts Based on Learner Characteristics

    Directory of Open Access Journals (Sweden)

    Joy Backhaus

    2017-02-01

    Full Text Available Personalized prompting research has shown the significant learning benefit of prompting. The current paper outlines and examines a personalized prompting approach aimed at eliminating performance differences on the basis of a number of learner characteristics (capturing learning strategies and traits. The learner characteristics of interest were the need for cognition, work effort, computer self-efficacy, the use of surface learning, and the learner’s confidence in their learning. The approach was tested in two e-modules, using similar assessment forms (experimental n = 413; control group n = 243. Several prompts which corresponded to the learner characteristics were implemented, including an explanation prompt, a motivation prompt, a strategy prompt, and an assessment prompt. All learning characteristics were significant correlates of at least one of the outcome measures (test performance, errors, and omissions. However, only the assessment prompt increased test performance. On this basis, and drawing upon the testing effect, this prompt may be a particularly promising option to increase performance in e-learning and similar personalized systems.

  1. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  2. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  3. Spoken Language Activation Alters Subsequent Sign Language Activation in L2 Learners of American Sign Language

    Science.gov (United States)

    Williams, Joshua T.; Newman, Sharlene D.

    2017-01-01

    A large body of literature has characterized unimodal monolingual and bilingual lexicons and how neighborhood density affects lexical access; however there have been relatively fewer studies that generalize these findings to bimodal (M2) second language (L2) learners of sign languages. The goal of the current study was to investigate parallel…

  4. Mainstream Teachers' Implicit Beliefs about English Language Learners: An Implicit Association Test Study of Teacher Beliefs

    Science.gov (United States)

    Harrison, Jamie; Lakin, Joni

    2018-01-01

    Teacher attitudes toward inclusion of English Learners (ELs) in the mainstream classroom have primarily focused on explicit beliefs as accessed through observation, case studies, and self-report surveys. The authors explore implicit mainstream teacher beliefs about ELs using the newly created Implicit Association Test-EL, with correlations to…

  5. Researching Oral Production Skills of Young Learners

    Science.gov (United States)

    Szpotowicz, Magdalena

    2012-01-01

    This chapter focuses on the development of young learners' ability to communicate in a foreign language. An empirical study was carried out to determine whether, after four years of learning English as a compulsory school subject, children are ready to engage in oral interaction in a semi-controlled task and produce answers and questions in…

  6. Access to, interest in and attitude toward e-learning for continuous education among Malaysian nurses.

    Science.gov (United States)

    Chong, Mei Chan; Francis, Karen; Cooper, Simon; Abdullah, Khatijah Lim; Hmwe, Nant Thin Thin; Sohod, Salina

    2016-01-01

    Continuous nursing education (CNE) courses delivered through e-learning is believed to be an effective mode of learning for nurses. Implementation of e-learning modules requires pre-assessment of infrastructure and learners' characteristics. Understanding the learners' needs and their perspectives would facilitate effective e-learning delivery by addressing the underlying issues and providing necessary support to learners. The aim of this study was to examine access to computer and Internet facilities, interest in and preferences regarding e-learning, and attitudes toward e-learning among nurses in Peninsular Malaysia. The study utilized a cross-sectional descriptive survey. Government hospitals and community clinics in four main regions of Peninsular Malaysia. A total of 300 registered nurses. Data were collected using questionnaires, which consisted of demographic and background items and questions on access to computer and Internet facilities, interest and preferences in e-learning, and attitudes toward e-learning. Descriptive analysis and a chi-squared test were used to identify associations between variables. Most Malaysian nurses had access to a personal or home computer (85.3%, n=256) and computer access at work (85.3%, n=256). The majority had Internet access at home (84%, n=252) and at work (71.8%, n=215); however, average hours of weekly computer use were low. Most nurses (83%, n=249) did not have an e-learning experience but were interested in e-learning activities. Most nurses displayed positive attitudes toward e-learning. Average weekly computer use and interest in e-learning were positively associated with attitudes toward e-learning. Study findings suggest that organizational support is needed to promote accessibility of information and communications technology (ICT) facilities for Malaysian nurses to motivate their involvement in e-learning. Copyright © 2015. Published by Elsevier Ltd.

  7. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  8. The learner’s perspective in GP teaching practices with multi-level learners: a qualitative study

    Science.gov (United States)

    2014-01-01

    Background Medical students, junior hospital doctors on rotation and general practice (GP) registrars are undertaking their training in clinical general practices in increasing numbers in Australia. Some practices have four levels of learner. This study aimed to explore how multi-level teaching (also called vertical integration of GP education and training) is occurring in clinical general practice and the impact of such teaching on the learner. Methods A qualitative research methodology was used with face-to-face, semi-structured interviews of medical students, junior hospital doctors, GP registrars and GP teachers in eight training practices in the region that taught all levels of learners. Interviews were audio-recorded and transcribed. Qualitative analysis was conducted using thematic analysis techniques aided by the use of the software package N-Vivo 9. Primary themes were identified and categorised by the co-investigators. Results 52 interviews were completed and analysed. Themes were identified relating to both the practice learning environment and teaching methods used. A practice environment where there is a strong teaching culture, enjoyment of learning, and flexible learning methods, as well as learning spaces and organised teaching arrangements, all contribute to positive learning from a learners’ perspective. Learners identified a number of innovative teaching methods and viewed them as positive. These included multi-level learner group tutorials in the practice, being taught by a team of teachers, including GP registrars and other health professionals, and access to a supernumerary GP supervisor (also termed “GP consultant teacher”). Other teaching methods that were viewed positively were parallel consulting, informal learning and rural hospital context integrated learning. Conclusions Vertical integration of GP education and training generally impacted positively on all levels of learner. This research has provided further evidence about the

  9. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  10. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  11. Increasing Access to Science Oriented Education Programmes in Tertiary Institutions in Ghana through Distance Education

    Science.gov (United States)

    Osei, C. K.; Mensah, J. A.

    2014-01-01

    There is emphasis in the educational policy of Ghana for the promotion of Distance Education programmes to widen access to education at all levels and facilitate human resource development. This study examined the level of access and challenges faced by learners in science oriented programmes offered by distance in the Kwame Nkrumah University of…

  12. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  13. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  14. How Do Chinese ESL Learners Recognize English Words during a Reading Test? A Comparison with Romance-Language-Speaking ESL Learners

    Science.gov (United States)

    Li, Hongli; Suen, Hoi K.

    2015-01-01

    This study examines how Chinese ESL learners recognize English words while responding to a multiple-choice reading test as compared to Romance-language-speaking ESL learners. Four adult Chinese ESL learners and three adult Romance-language-speaking ESL learners participated in a think-aloud study with the Michigan English Language Assessment…

  15. Effect of Weblog-Based Process Approach on EFL Learners' Writing Performance and Autonomy

    Science.gov (United States)

    Azari, Mohammad Hosein

    2017-01-01

    This article investigated the effect of weblog use in a process-based writing course on the writing performance of students as well as on their level of learner autonomy. The participants were 43 English language learners who were doing their BA in the field of English Language Teaching. The control group (n = 19) went through in-class writing…

  16. Accessible Earth: Enhancing diversity in the Geosciences through accessible course design

    Science.gov (United States)

    Bennett, R. A.; Lamb, D. A.

    2017-12-01

    The tradition of field-based instruction in the geoscience curriculum, which culminates in a capstone geological field camp, presents an insurmountable barrier to many disabled students who might otherwise choose to pursue geoscience careers. There is a widespread perception that success as a practicing geoscientist requires direct access to outcrops and vantage points available only to those able to traverse inaccessible terrain. Yet many modern geoscience activities are based on remotely sensed geophysical data, data analysis, and computation that take place entirely from within the laboratory. To challenge the perception of geoscience as a career option only for the non-disabled, we have created the capstone Accessible Earth Study Abroad Program, an alternative to geologic field camp for all students, with a focus on modern geophysical observation systems, computational thinking, data science, and professional development.In this presentation, we will review common pedagogical approaches in geosciences and current efforts to make the field more inclusive. We will review curricular access and inclusivity relative to a wide range of learners and provide examples of accessible course design based on our experiences in teaching a study abroad course in central Italy, and our plans for ongoing assessment, refinement, and dissemination of the effectiveness of our efforts.

  17. Project Work Management Addressing the Needs of BVI Learners of EFL

    Directory of Open Access Journals (Sweden)

    Tatiana S. Makarova

    2017-12-01

    Full Text Available Introduction: it is known that inclusive education that opens access to education and facilitates students with special educational needs to socialize successfully is concentrated in special schools whilst mainstream teachers generally lack the methodology of teaching disabled students inclusively. The aim of the article is searching the best ways of educating students with special needs and providing specific conditions of the educational process in mainstream schools. Materials and Methods: the research is based on the results of fulfillment of a number of projects that deal with teaching and educating blind and visually impaired learners and in which all the authors of the article were involved. The problematic approach, the logical method and observation were applied to the research; analysis, comparison, generalization being the most important components of the study. The quantitative data were collected, analyzed and resumed as well. Results: the impact of project work implementation on academic and social skills development of blind and visually impaired students is shown and various types of projects that can be made by visually impaired learners are presented. The authors give their comments when analyzing different ways of adapting research activities to the needs of BVI learners. When speaking in detail on the role of web tools as maximizers of students’ potential the authors refer to their own experience in implementing web tools in project work with blind and visually impaired learners. Discussion and Conclusions: university teacher-training programs should be revised and improved by offering additional courses aimed at educating impaired students through doing research or project work. Special attention should be paid to developing the instructors’ project management skills in terms of teaching English as a foreign language to learners with special needs. It should be noted that different methods and various technological tools

  18. Speaking out on Behalf of the Voiceless Learners: Written Corrective Feedback for English Language Learners in Iran

    Science.gov (United States)

    Nemati, Majid; Alavi, Sayyed Mohammad; Mohebbi, Hassan; Masjedlou, Ali Panahi

    2017-01-01

    To date, L2 researchers have studied the effect of feedback on improving L2 learners' writing from different perspectives. However, there are a lot of aspects which are not comprehensively researched yet, such as L2 learners' and teachers' perceptions and practices about feedback. To close the gap, this study investigates language learners'…

  19. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  20. The Effect of Genre-Based Teaching on EFL Learners' Speaking Performance

    Directory of Open Access Journals (Sweden)

    Mohammad Bagher Khatibi

    2014-09-01

    Full Text Available Abstract The present study examined the effect of genre-based tasks on EFL learners' speaking performance and probed whether genre-based tasks may empower EFL learners to perform better on speaking tests. A further concern of the study was to explore whether the effect of genre-based tasks on speaking ability of EFL learners varied across different age groups, i.e. teenagers (13-16 years old and young adults (24-27 years old. To this end, some generic based consciousness-raising tasks (CRT were adapted from the model proposed by Benedict (2006 to develop control of a genre used as the treatment procedures. Two different speaking tests of different genres (e.g. recount, report, review, etc., used as pretest and posttest, were administered to 120 senior university students majoring in English language translation. The results indicated that consciousness-raising tasks significantly affected EFL learners' speaking performance. However, the effect of generic-based CRTs did not vary across different age groups. Overall, the findings provided empirical support for the facilitative effect of generic-based consciousness-raising tasks on speaking performance of EFL learners. The findings may promise implications for EFL speaking syllabuses and provide guidelines to designers to accommodate the insights derived from the genre-based instruction perspective.

  1. Positioning Extension Massive Open Online Courses (xMOOCs) within the Open Access and the Lifelong Learning Agendas in a Developing Setting

    Science.gov (United States)

    Nkuyubwatsi, Bernard

    2016-01-01

    Recent reports on xMOOCs indicate that underprivileged learners in need of higher education have minimally been reached by these courses. While the "open access" agenda is needed to reach such learners, most MOOCs have been developed in societies that have shifted toward the "lifelong learning" agenda. In this paper, xMOOCs are…

  2. Adult learners' perceptions of MOOC motivation, success, and completion: a virtual ethnographic study

    OpenAIRE

    Loizzo, Jamie Lynn

    2015-01-01

    Massive open online courses (MOOCs) have been credited with disrupting the traditional classroom and challenging distance education models in higher education. MOOCs were developed with the intention of opening up education to the masses, specifically those in developing countries who could not readily access educational resources or opportunities. However, early quantitative reports have shown that MOOC participants tend to be adult learners who already possess bachelor's or master's degrees...

  3. Facebook: Facilitating Social Access and Language Acquisition for International Students?

    Science.gov (United States)

    Lee, Kent; Ranta, Leila

    2014-01-01

    Many international students come to Canada to improve their English language proficiency and develop friendships with Canadians and other international students. However, gaining access to host nationals (i.e., Canadians) is not an easy task for most English as a second language (ESL) learners. Factors such as language proficiency may hamper…

  4. Researching transformative learning spaces through learners' stories

    DEFF Research Database (Denmark)

    Maslo, Elina

    spaces, learning to learn through languages, learners´ stories, qualitative research method Methodology or Methods/Research Instruments or Sources Used A number of semi structured qualitative interviews have been conducted with three learners of Danish as second language. The language learners...... in the paper is on the research process and methodological tools. The goal of this paper is to show, that learners´ stories have a huge potential in researching learning processes. References Benson, P. & D. Nunan (2004). Lerners´ stories. Difference and Diversity in Language Learning. Cambridge University...... to use learners´ stories as a research methodology in the field of learning in general and language learning in particular....

  5. Mobile-Assisted Language Learning and Language Learner Autonomy

    Science.gov (United States)

    Lyddon, Paul

    2016-01-01

    In the modern age of exponential knowledge growth and accelerating technological development, the need to engage in lifelong learning is becoming increasingly urgent. Successful lifelong learning, in turn, requires learner autonomy, or "the capacity to take control of one's own learning" (Benson, 2011, p. 58), including all relevant…

  6. The Effect of Using Online Collaborative Tasks on Incidental Vocabulary Learning of Impulsive vs. Reflective Iranian EFL Learners

    Directory of Open Access Journals (Sweden)

    Khalil Motallebzadeh

    2017-09-01

    Full Text Available Incidental vocabulary learning is one of the most significant sources of learning vocabulary for language learners Laufer  & Hulstjin, 2001. This study endeavored to investigate the effect of using online collaborative tasks on incidental vocabulary learning of impulsive vs. reflective Iranian EFL learners. To this end, Nelson vocabulary proficiency test was administered to 100 Iranian EFL learners as the homogeneity test and the pretest. Using random sampling procedure, 75 learners were selected as the main participants for this study. Kember, McKay, Sinclair and Wong (2008 reflective thinking questionnaire was administered to these learners, based on which they were distinguished based on their cognitive thinking styles, i.e., impulsivity and reflectivity. The participants were homogenously distributed into 3 main groups (impulsive experimental group, reflective experimental group, and the control group. All participants went through 4 weeks of treatment. Experimental groups were conducted using Telegram software and the control group was conducted in a classroom. The results of t-test after 4 weeks of treatment revealed that reflective learners benefited from online collaborative groups with regard to incidental vocabulary learning. The findings of the study are discussed in light of previous research.

  7. L2 Acquisition of Prosodic Properties of Speech Rhythm: Evidence from L1 Mandarin and German Learners of English

    Science.gov (United States)

    Li, Aike; Post, Brechtje

    2014-01-01

    This study examines the development of speech rhythm in second language (L2) learners of typologically different first languages (L1s) at different levels of proficiency. An empirical investigation of durational variation in L2 English productions by L1 Mandarin learners and L1 German learners compared to native control values in English and the…

  8. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  9. Profiling Learners' Achievement Goals when Completing Academic Essays

    Science.gov (United States)

    Ng, Chi-Hung Clarence

    2009-01-01

    This study explored adult learners' goal profiles in relation to the completion of a compulsory academic essay. Based on learners' scores on items assessing mastery, performance-approach, and work-avoidance goals, cluster analyses produced three distinct categories of learners: performance-focused, work-avoidant, and multiple-goal learners. These…

  10. The Support System in Distance Education:Factors Affecting Achievements Among Women Learners

    Directory of Open Access Journals (Sweden)

    Rozhan M IDRUS

    2005-10-01

    Full Text Available The Support System in Distance Education:Factors Affecting Achievements Among Women Learners Hanafi ATAN Zuraidah A. RAHMAN Omar MAJID Noraida A. GHANIRozhan M IDRUS School of Distance EducationUniversiti Sains Malaysia11800 Penang, MALAYSIA ABSTRACT Distance education has the potential to contribute to the enhancement of women’s development by overcoming not only temporal and spatial barriers but familial commitments as well. It brings education to their home and allows women to learn at their individual pace, seek skills for individual development and at the same time, enables them to fulfill family responsibilities. An important element of distance education is the provision of the learner support system that provides students the access to learning resources and means of communication that would facilitate the array of educational activities and exposure to various other guidance and advisories. This paper reports on the study undertaken to elucidate the dimensions of the support system provided by the School of Distance Education (SDE, Universiti Sains Malaysia (USM to its women learners that would have significant impact on their achievements. The factorial analysis conducted revealed that the role of the faculty is the main contributing factor affecting these achievements, followed by the provision of the intensive course, the electronic portal, video conferencing and to a much lesser extent, the existence of the regional centres. The implications of this study are discussed with the view of improving the support system provided by the institution and the need to put into action the necessary strategies to further improve the achievement of the women learners.

  11. Online Access Patterns and Students

    Directory of Open Access Journals (Sweden)

    Nasir Butrous

    2011-04-01

    Full Text Available The paper follows accessing patterns of five cohorts of postgraduate students enrolled in a core unit within a master of business administration (MBA program. The unit is designed to provide numerous opportunities for student participation in Discussion Boards using Blackboard technology. Discussion Boards create numerous opportunities for interaction amongst online learners to share and exchange their experiences, creating a sense of a virtual community. Relationships between accessing patterns for each week of the semester for each student are explored in relation to their performance using course statistics generated by the Blackboard technology. Close examination of the significant differences in access patterns to the course window and its components of communication, content, and student areas reveal middle of the semester (week 7 as the common critical point that differentiates high achieving students from low achieving students. Identifying critical points provides the faculty staff member an opportunity to introduce intervention strategies in order to improve the learning experience of all the students.

  12. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  13. Issues of promoting learner autonomy in EFL context

    Directory of Open Access Journals (Sweden)

    Pichugova Inna L.

    2016-01-01

    Full Text Available The paper is focuded on investigating the phenomenon of learner autonomy, which has mostly been explored in Europe and the USA and is now attracting attention of researchers and academics in many other countries including Russia. Learner autonomy through a focus on learner reflection and taking responsibility for one’s own learning processes has become a central concern in the recent history of language teaching. However, many language teachers, who are committed to concepts of learnercentredness and autonomy, struggle with the ways to foster learner autonomy or at least to encourage the idea of learner autonomy in language classroom. The study aims at investigating what the most important issues which have a great impact on developing learner autonomy are. Having given special attention to conditions which can insure development of learner autonomy, a model covering seven issues relating to the subject matter has been designed. The authors state that such aspects as choice, goals and needs, support, emotional climate, learning strategies, learner attitude and motivation, and self-esteem should be considered as the goal to promote learner autonomy in EFL context.

  14. Possibilities of Independent Learning in Two Self-Access Facilities of an Iranian University

    Directory of Open Access Journals (Sweden)

    Afshin Mohammadi

    2014-09-01

    Full Text Available The roles that self-access centers play in language learners’ development of autonomy considerably vary in accordance with the institutional features attributed to their structure and the services they offer. As part of a larger study which assessed 100 learners’ readiness for autonomy, this paper reports on the status quo of two facilities at the humanities faculty of an Iranian university, based on English-as-Foreign-Language (EFL learners’ views and practices. Seven undergraduate EFL learners from various years of study were asked to describe the ways in which they exploit self-access services for language learning purposes and express their opinions vis-à-vis their functionality through semi-structured interviews. Findings reveal that most learners preferred not to attend the computer center, principally because, the Internet, as the most widely acknowledged service, had become available in other places around the university, such as in the dormitory. The reasons for this reluctance are highlighted, along with a presentation of some suggestions for upgrading learners’ participation in self-access language learning in similar contexts.

  15. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  16. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  17. The OPL Access Control Policy Language

    Science.gov (United States)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  18. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  19. Flexible provisioning for adult learners

    NARCIS (Netherlands)

    Hermans, Henry; Janssen, José; Vogten, Hubert; Koper, Rob

    2014-01-01

    In adult education there is a continuous, growing demand for learning opportunities that fit the specific characteristics and preferences of particular learner groups or individual learners. This requires educational institutions to rethink their business and educational models, and develop more

  20. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  1. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  2. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  3. The Effect of Video-Based Tasks in Listening Comprehension of Iranian Pre-Intermediate EFL Learners

    Science.gov (United States)

    Sarani, Abdullah; Behtash, Esmail Zare; Nezhad Arani, Saieed Moslemi

    2014-01-01

    This study aims at finding the effect of video-based tasks in improving the listening comprehension ability of Iranian pre-intermediate EFL (English Foreign Language) learners. After determining the level of learners, an experimental and control group, each of 20 participants, were nominated to contribute to the study. From the time the pre-test…

  4. Web Annotation and Threaded Forum: How Did Learners Use the Two Environments in an Online Discussion?

    Science.gov (United States)

    Sun, Yanyan; Gao, Fei

    2014-01-01

    Web annotation is a Web 2.0 technology that allows learners to work collaboratively on web pages or electronic documents. This study explored the use of Web annotation as an online discussion tool by comparing it to a traditional threaded discussion forum. Ten graduate students participated in the study. Participants had access to both a Web…

  5. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    or treatment. Improving access and quality of care in a. TB control programme. Vera Scott, Virginia Azevedo, Judy Caldwell. Objectives. To use a quality improvement approach to improve access to and quality of tuberculosis (TB) diagnosis and care in. Cape Town. Methods. Five HIV/AIDS/sexually transmitted infections/TB.

  6. Improving Learner Handovers in Medical Education.

    Science.gov (United States)

    Warm, Eric J; Englander, Robert; Pereira, Anne; Barach, Paul

    2017-07-01

    Multiple studies have demonstrated that the information included in the Medical Student Performance Evaluation fails to reliably predict medical students' future performance. This faulty transfer of information can lead to harm when poorly prepared students fail out of residency or, worse, are shuttled through the medical education system without an honest accounting of their performance. Such poor learner handovers likely arise from two root causes: (1) the absence of agreed-on outcomes of training and/or accepted assessments of those outcomes, and (2) the lack of standardized ways to communicate the results of those assessments. To improve the current learner handover situation, an authentic, shared mental model of competency is needed; high-quality tools to assess that competency must be developed and tested; and transparent, reliable, and safe ways to communicate this information must be created.To achieve these goals, the authors propose using a learner handover process modeled after a patient handover process. The CLASS model includes a description of the learner's Competency attainment, a summary of the Learner's performance, an Action list and statement of Situational awareness, and Synthesis by the receiving program. This model also includes coaching oriented towards improvement along the continuum of education and care. Just as studies have evaluated patient handover models using metrics that matter most to patients, studies must evaluate this learner handover model using metrics that matter most to providers, patients, and learners.

  7. Determining the Accessibility of K-12 Digital Materials: Tools for Educators

    Science.gov (United States)

    Smith, Sean J.; Stahl, William

    2016-01-01

    This article explores the manner in which teachers and district leaders can further determine whether or not the digital materials they are considering are accessible for all learners--particularly those with disabilities--and appropriate to the accommodations and modifications provided in the brick-and-mortar school environment. The article…

  8. Learners' independent records of vocabulary

    DEFF Research Database (Denmark)

    Shaw, Philip; Leeke, Philip

    1999-01-01

    Handbooks recommend a variety of quite complicated procedures for learning and remembering vocabulary, but most learners only engage in very simple procedures. The aim of this project was to establish a basis for identifying optimal vocabulary recording procedures by finding out what learners...

  9. Buffalo City learners' knowledge of abortion legislation

    African Journals Online (AJOL)

    2014-06-19

    Jun 19, 2014 ... Objectives: This research investigated Grade 11 learners' knowledge of the CTOP Act and ... those learners attending schools formerly designated for African learners during Apartheid .... be performed if, in the opinion of a medical practitioner, ..... of pre-termination of pregnancy counselling to the woman.

  10. Dimensionality in Language Learners' Personal Epistemologies

    Science.gov (United States)

    Nikitina, Larisa; Furuoka, Fumitaka

    2018-01-01

    This study aimed to examine dimensionality in language learners' epistemic beliefs. To achieve this, a survey was conducted using a newly-developed research instrument-"Language Learners' Epistemic Beliefs" (LLEB) questionnaire. Based on a review of literature, it was proposed that language learners' epistemic beliefs would cluster in…

  11. Exploring high school learners' perceptions of bullying.

    Science.gov (United States)

    Blake, Patricia; Louw, Johann

    2010-12-01

    Learners' perceptions of aspects of school life that are sufficiently serious to interfere with their schoolwork were investigated. Bullying was a form of behaviour that was singled out for inclusion and further exploration in the study. Learners from three coeducational Western Cape Education Department schools were surveyed: 414 Grade 8 and 474 Grade 9 learners completed an anonymous, voluntary self-report questionnaire. Factors identified as most frequently interfering with their schoolwork included classmates not listening in class, feeling overwhelmed by schoolwork, teacher absenteeism, and verbal fighting. When asked specifically about bullying, 40% of learners indicated that they frequently experienced bullying at school-although they ranked it as much lower when compared to other potentially problematic school experiences. Furthermore, although the majority of learners indicated they thought teachers considered bullying a problem, few felt there was anything that school staff could do to counteract bullying effectively. These findings suggest that learners perceive bullying as an unavoidable part of school experience and have normalised this aggressive behaviour.

  12. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  13. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    delays and also by the choice of the time instances at which sensor information is accessed. In order to optimize the latter, we introduce an information quality metric and a mathematical model based on Markov chains, which are compared performance-wise to a heuristic approach for finding this parameter......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  14. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  15. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  16. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  17. Effect of Instructional vs. Authentic Video Materials on Introvert and Extrovert Iranian EFL Learners' Vocabulary Learning

    Directory of Open Access Journals (Sweden)

    Parya Isazadeh

    2016-10-01

    Full Text Available The study delved into the effect of instructional video materials vs. authentic video materials on vocabulary learning of extrovert and introvert Iranian EFL learners. To this end, Nelson proficiency test was administered to one hundred eighty (n=180 language learners. Considering 1 standard deviation above and below the mean score, one hundred twenty three (n=123 language learners were selected for the study. These participants were distributed into 4 experimental groups (with 25 learners and a control group (with 23 learners. Researcher-made vocabulary pretest and posttest which were designed using the vocabularies from the movies were also administered to the participants. The findings of the study after three weeks of treatment revealed that both authentic video materials and instructional video materials can have positive effect on vocabulary learning of Iranian EFL leaners. This effect, however, is not different among extrovert learners. It was also revealed that introvert EFL learners benefit more from authentic video materials. The findings of the study could be used by material developers or language teachers who may wish to use video materials in their classes. Keywords: Authentic video materials, Instructional video materials, Vocabulary learning, Introversion, Extroversion

  18. Dyscalculia and Access Arrangements for Exams and Assessments. NIACE Briefing Sheet 87

    Science.gov (United States)

    National Institute of Adult Continuing Education, 2009

    2009-01-01

    Dyscalculia is considered to be a learning difficulty or difference. It is increasingly being recognised and "diagnosed" within adult learning. However, practitioners are often unclear about whether learners who are considered to have dyscalculia are entitled to access arrangements for examinations and assessments, and which access…

  19. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  20. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  1. Reconciling Means and Ends in Equity and Access through Further and Higher Education Sector Partnerships: An Australian Case

    Science.gov (United States)

    Broughton, Sharon

    2005-01-01

    This paper examines the educational implications of pursuing equity and access for adult learners across further and higher education sectors. It contextualizes some advantages and disadvantages in cross-sectoral arrangements by reference to a specific access and equity partnership program in Australia and analyses the impact on the equity aims of…

  2. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  3. EFL learners’ motivational beliefs and their use of learning strategies

    Directory of Open Access Journals (Sweden)

    Sedigheh Najibi

    2015-02-01

    Full Text Available The present study attempted to examine the relationship between English as a Foreign Language (EFL learners’ motivational beliefs and their use of learning strategies. The three components of motivation, i.e. expectancy component, value component and affective component, were examined in relation to metacognitive, cognitive and effort management strategies. Two hundred and fifty seven EFL learners representing different proficiency levels completed the Persian version of the Motivated Strategies for Learning Questionnaire (MSLQ, which consisted of motivation scale and learning strategies scale. The analysis of the effect of proficiency level on motivational beliefs showed a significant effect of proficiency level on test anxiety and extrinsic goal orientation, suggesting that less proficient learners were significantly more anxious and more extrinsically oriented compared to advanced learners of English. It was also found that self-efficacy, control of learning beliefs, intrinsic goal orientation and task value could account for 70% of variations in self-regulated learning (SRL strategies. Based on the findings of this study, several suggestions are made to aid instructors in creating a non-product-oriented approach to learning, which promotes foreign language learners’ learning outcomes.

  4. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  5. Development of affective modelling competencies in primary school learners

    Directory of Open Access Journals (Sweden)

    Piera Biccard

    2011-09-01

    Full Text Available Learner affect and beliefs about mathematics are complex and multifaceted aspects of mathematical learning. Traditional teaching and learning approaches in mathematics education often result in problematic beliefs about mathematics. Since beliefs influence what learners learn and how they deal with learning mathematics, it is essential that the roles of beliefs and affect in mathematics classrooms are carefully examined. In solving modelling problems, learners and teachers take on new roles in the classroom: learners are placed in an active, self-directing situation in which they solve real-world problems. When learners engage in modelling tasks, they display and integrate cognitive, meta-cognitive and affective competencies. A modelling approach therefore allows one to detect learner beliefs in an authentic learning environment. Will this environment lead to students having more positive and productive dispositions towards mathematics? This article presents partial results of a study documenting the development of modelling competencies in learners working in groups over a period of 12 weeks. Through a design research approach, 12 learners working in groups solved three modelling problems, and transcriptions of learner interactions, questionnaires and informal interviews revealed that learner beliefs improved over this short period when exposed to modelling tasks. The results are encouraging, and may provide mathematics education with an avenue to develop more positive learner beliefs in mathematics.

  6. Autonomous Learner Model Resource Book

    Science.gov (United States)

    Betts, George T.; Carey, Robin J.; Kapushion, Blanche M.

    2016-01-01

    "Autonomous Learner Model Resource Book" includes activities and strategies to support the development of autonomous learners. More than 40 activities are included, all geared to the emotional, social, cognitive, and physical development of students. Teachers may use these activities and strategies with the entire class, small groups, or…

  7. Considering the needs of English language learner populations: an examination of the population validity of reading intervention research.

    Science.gov (United States)

    Moore, Brooke A; Klingner, Janette K

    2014-01-01

    This article synthesizes reading intervention research studies intended for use with struggling or at-risk students to determine which studies adequately address population validity, particularly in regard to the diverse reading needs of English language learners. An extensive search of the professional literature between 2001 and 2010 yielded a total of 67 reading intervention studies targeting at-risk elementary students. Findings revealed that many current research studies fail to adequately describe the sample, including the accessible and target populations, and to disaggregate their findings based on demographic characteristics. When population validity issues are not addressed, researchers cannot generalize findings to other populations of students, and it becomes unclear what intervention strategies work, especially with English language learner student populations. However, 25 studies did specifically recognize and address the needs of English language learners, indicating more researchers are taking into consideration the diverse needs of other struggling student populations. © Hammill Institute on Disabilities 2012.

  8. High school learners' mental construction during solving ...

    African Journals Online (AJOL)

    Structured activity sheets with three tasks were given to learners; these tasks were done in groups, and the group leaders were interviewed. It was found that learners tended to do well with routine-type questions, implying that they were functioning at an action level. From the interviews it appeared that learners might have ...

  9. An Analysis of Lexical Errors of Korean Language Learners: Some American College Learners' Case

    Science.gov (United States)

    Kang, Manjin

    2014-01-01

    There has been a huge amount of research on errors of language learners. However, most of them have focused on syntactic errors and those about lexical errors are not found easily despite the importance of lexical learning for the language learners. The case is even rarer for Korean language. In line with this background, this study was designed…

  10. Effect of learner-centered teaching on motivation and learning strategies in a third-year pharmacotherapy course.

    Science.gov (United States)

    Cheang, Kai I

    2009-05-27

    To develop, implement, and assess a learner-centered approach to teaching a third-year pharmacotherapy course in a doctor of pharmacy (PharmD) program. The pharmacotherapy course was restructured according to the learner-centered approach. The Motivated Strategies for Learning Questionnaire (MSLQ) was administered to students before and after taking the course, and changes in MSLQ subscales from baseline were evaluated. Students' response to the learner-centered approach and characteristics associated with MSLQ scores were also evaluated. Compared to baseline, students' intrinsic goal orientation control of learning beliefs, self-efficacy, critical thinking, and metacognitive self-regulation improved after taking the course. Students responded positively to the learner-centered approach. Additionally, students with a clinical practice career orientation or who prepared frequently for classes scored higher on several MSLQ domains. The learner-centered approach was effective in promoting several domains of motivation and learning strategies in a third-year pharmacotherapy course.

  11. Technologies for learner-centered feedback

    Directory of Open Access Journals (Sweden)

    Jane Costello

    2013-09-01

    Full Text Available As the number, type, and use of technologies to support learning increases, so do the opportunities for using these technologies for feedback. Learner-centered feedback is a core to the teaching-learning process. It is related to assessment in describing how learners perform in their learning, their gain in knowledge, skills, and attitudes. Feedback, types of feedback, guidelines for effective learner-centered feedback, and feedback’s relationship to assessment are presented. Methods of providing feedback, for example, automated, audio scribe pens, digital audio, etc., and the related technologies are described. Technologies that allow instructors to make informed decisions about the use of various methods for feedback are discussed.

  12. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  13. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  14. Learners, teachers and curriculum

    DEFF Research Database (Denmark)

    Petersen, Karen Bjerg

    2008-01-01

    of virtual e-learning, interviews with teachers and 10 learner participants in a virtual classroom setting, and discourse analysis of curriculum developed for the particular e-learning course The research has taken place in the context of a study of e-learning and virtual teaching of Danish as a Second...... language for adults. The research results indicate that teachers seem to compensate by trying to create virtual communities of learning. Learners, however, experience disembedded relations. Conversely, curriculum development, on tends to ‘exploit’ the conditions of disembedding social relations in e-learning......, locationally distant”. The aim of the paper is to analyse and discuss how different positions in e-learning settings result in different answers to modernity. These settings can be applied to either teacher, learner or curriculum positions. The research was based on a qualitative longitudinal case study...

  15. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    grids, which targets a reduction of over- and under voltage level situations by adjusting reactive power production of selected low voltage grid assets. The paper models different information access schemes between remote assets and controller, which is activated only when certain voltage thresholds...... stochastic models. We investigate in this paper the suitability for using these two metrics for optimization in a voltage grid control scenario. We conclude that, while the mismatch probability is very useful compared to the simpler information age metric from a network designers and operators point of view...

  16. Language Learner Strategies for Building EFL Learners’ Autonomy

    Directory of Open Access Journals (Sweden)

    Hooshang Khoshsima

    2015-11-01

    Full Text Available The critical discussions and matters in enhancing students’ learning performance, knowledge, and language proficiency have received a remarkable degree of attention in educational contexts. This study was undertaken to encourage learners to build the required competence in the foreign language by utilizing learning strategies so that they could become autonomous learners. Language learners' learning difficulties while learning a foreign language were identified in this study. With regard to problems which language learners faced in learning a foreign language, the teachers are able to recognize and to utilize appropriate language learning strategies in order to develop autonomy in learners who conceptualize and use those strategies in the foreign language. The research design adopted for the present study was survey method. The data for the study were collected with the use of a questionnaire. This questionnaire was administered to a total of 60 EFL learners who were selected from a university in Iran. It was used to assess learners’ awareness and perceived use of strategies and to provide data on their best utilized strategies. Results have been driven through statistical analysis. The analyzed data reveal the students’ styles and assist teachers to take part in shifting the strategies and heighten language learners' autonomy. The findings support the claim that knowing and making language learners aware of the most appropriate strategy would assist learners to improve their autonomy and to enhance their learning.

  17. Learner Differences in Perceived Satisfaction of an Online Learning: An Extension to the Technology Acceptance Model in an Arabic Sample

    Science.gov (United States)

    Al-Azawei, Ahmed; Lundqvist, Karsten

    2015-01-01

    Online learning constitutes the most popular distance-learning method, with flexibility, accessibility, visibility, manageability and availability as its core features. However, current research indicates that its efficacy is not consistent across all learners. This study aimed to modify and extend the factors of the Technology Acceptance Model…

  18. Artificial learners adopting normative conventions from human teachers

    Directory of Open Access Journals (Sweden)

    Cederborg Thomas

    2017-11-01

    Full Text Available This survey provides an overview of implemented systems, theoretical work, as well as studies of biological systems relevant to the design of artificial learners trying to figure out what a human teacher would like them to do. Implementations of artificial learners are covered, with a focus on experiments trying to find better interpretations of human behavior, as well as algorithms that autonomously improve a model of the teacher. A distinction is made between learners trying to interpret teacher behavior in order to learn what the teacher would like the learner to do on the one hand, and learners whose explicit or implicit goal is to get something from the teacher on the other hand (for example rewards, or knowledge about how the world works. The survey covers the former type of systems. Human teachers are covered, focusing on studies that say something concrete about how one should interpret the behavior of a human teacher that is interacting with an artificial learner. Certain types of biological learners are interesting as inspiration for the types of artificial systems we are concerned with. The survey focus on studies of biological learners adopting normative conventions, as well as joint intentionality team efforts.

  19. Usage Control Enhanced Access Control Based on XACML%使用控制支持的基于XACML的访问控制

    Institute of Scientific and Technical Information of China (English)

    陶宇炜; 符彦惟

    2011-01-01

    针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型.用可扩展访问标记语占XACML描述访问控制的授权策略,结合SAML声明和请求/响应机制,根据用户、资源、环境的属性进行访问控制决策,可动态地评估访问请求,提供细粒度的访问控制和良好的互操作性.%Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.

  20. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  1. Learner Motivation and Interest

    OpenAIRE

    Daskalovska, Nina; Gudeva, Liljana Koleva; Ivanovska, Biljana

    2012-01-01

    There are a lot of factors which influence success in learning. However, one of the most important factors is the learner’s motivation to reach the desired goals. Research and experience show that learners with strong motivation can achieve a lot regardless of circumstances. Studies of motivation in second language learning have led to several distinctions, one of which is the distinction between integrative and instrumental motivation. According to this distinction, some learners are motivat...

  2. Tweetalige aanleerderswoordeboek . bilingual learner's dictionary ...

    African Journals Online (AJOL)

    Correct pronunciation is not guaranteed, because only syllabification and the main stress are indicated in words. Grammatical guidance is also not given to such an extent that learners will be able to generate correct sentences on their own. The role that contrastive analysis and error analysis can play to anticipate learners' ...

  3. Learner Beliefs about Sociolinguistic Competence: A Qualitative Case Study of Four University Second Language Learners

    Science.gov (United States)

    Yang, Jinsuk; Rehner, Katherine

    2015-01-01

    This article explores the beliefs about second language (L2) sociolinguistic competence of four university-level advanced L2 learners. It places particular emphasis on 1) how these university learners conceptualized L2 sociolinguistic competence; 2) how they thought about two different language learning contexts (viz., the L2 classroom versus…

  4. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  5. From Digital Divide to Digital Equity: Learners' ICT Competence in Four Primary Schools in Cape Town, South Africa

    Science.gov (United States)

    Gudmundsdottir, G. B.

    2010-01-01

    This study explores factors influencing the digital divide in four schools in Cape Town, South Africa. Three of the schools are for disadvantaged learners whereas the fourth was previously for whites only. All the schools use ICT in their curriculum delivery and thereby support the emphasis of provincial educational authorities on ICT access for…

  6. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance......It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...

  7. Health literacy and the social determinants of health: a qualitative model from adult learners.

    Science.gov (United States)

    Rowlands, Gillian; Shaw, Adrienne; Jaswal, Sabrena; Smith, Sian; Harpham, Trudy

    2017-02-01

    Health literacy, ‘the personal characteristics and social resources needed for individuals and communities to access, understand, appraise and use information and services to make decisions about health’, is key to improving peoples’ control over modifiable social determinants of health (SDH). This study listened to adult learners to understand their perspectives on gathering, understanding and using information for health. This qualitative project recruited participants from community skills courses to identify relevant ‘health information’ factors. Subsequently different learners put these together to develop a model of their ‘Journey to health’. Twenty-seven participants were recruited; twenty from community health literacy courses and seven from an adult basic literacy and numeracy course. Participants described health as a ‘journey’ starting from an individual's family, ethnicity and culture. Basic (functional) health literacy skills were needed to gather and understand information. More complex interactive health literacy skills were needed to evaluate the importance and relevance of information in context, and make health decisions. Critical health literacy skills could be used to adapt negative external factors that might inhibit health-promotion. Our model is an iterative linear one moving from ethnicity, community and culture, through lifestyle, to health, with learning revisited in the context of different sources of support. It builds on existing models by highlighting the importance of SDH in the translation of new health knowledge into healthy behaviours, and the importance of health literacy in enabling people to overcome barriers to health.

  8. Technologies for Learner-Centered Feedback

    Science.gov (United States)

    Costello, Jane; Crane, Daph

    2013-01-01

    As the number, type, and use of technologies to support learning increases, so do the opportunities for using these technologies for feedback. Learner-centered feedback is a core to the teaching-learning process. It is related to assessment in describing how learners perform in their learning, their gain in knowledge, skills, and attitudes.…

  9. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  10. Learner-Centred Teaching Contributes in Promising Results in Improving Learner Understanding and Motivation: A Case Study at Malaysia Tertiary Education

    Science.gov (United States)

    Yap, Wei-Li; Neo, Mai; Neo, Tse-Kian

    2016-01-01

    In Malaysia, traditional teaching is still a common approach among many lecturers. There have been many studies that have reported its limitations and many lecturers have started to adopt a more learner-centred teaching approach to promote better learner understanding and learner motivation. Throughout this effort, it is noticed there are…

  11. A Logic for Reasoning About Time-Dependent Access Control Policies

    National Research Council Canada - National Science Library

    DeYoung, Henry

    2008-01-01

    .... Because of the number and complexity of authorization policies in access control systems, it is clear that ad hoc methods for specifying and enforcing policies cannot inspire a high degree of trust...

  12. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  13. Learner Agency within the Design of an EAP Course

    Science.gov (United States)

    Seppälä, Riina

    2015-01-01

    To meet the demands of today's society and working life, higher education should support the development of learner agency. How the agency of individual learners emerges in university courses and what kind of agency empowers the learners to face new challenges should be considered. In this article, the focus is on learner agency enabled and…

  14. Experiences of learners from informal settlements

    African Journals Online (AJOL)

    Erna Kinsey

    problem is further compounded if educators are not trained to work with learners from ... to locate problems that emerge with the learners themselves rather than within the system ..... "Black students' school success: coping with the burden of ...

  15. Profiling Mobile English Language Learners

    Science.gov (United States)

    Byrne, Jason; Diem, Robert

    2014-01-01

    The purpose of this study was to use an app-embedded survey to profile language learner demographics. A total of 3,759 EFL language learners from primarily eight L1 backgrounds (French, German, Italian, Japanese, Korean, Russian, Spanish and Thai) responded to the survey embedded within a popular English grammar app. This app has over 500,000…

  16. Turning university professors into competent learners

    NARCIS (Netherlands)

    Stefanova, Eliza; Ilieva, Miroslava; Nikolova, Nikolina; Stefanov, Krassen

    2008-01-01

    Stefanova, E., Ilieva, M., Nikolova, N, & Stefanov, K. (2008). Turning university professors into competent learners. In H. W. Sligte & R. Koper (Eds.), Proceedings of the 4th TENCompetence Open Workshop. Empowering Learners for Lifelong Competence Development: pedagogical, organisational and

  17. Key Issues and Opportunities in the Initial Identification and Classification of English Learners. Research Report. ETS RR-16-09

    Science.gov (United States)

    Lopez, Alexis A.; Pooler, Emilie; Linquanti, Robert

    2016-01-01

    English learners (ELs) require access to appropriate instructional services that match their strengths and needs to have an equal opportunity to achieve the same academic standards as other students. If ELs are not properly identified and classified, they may be excluded from services that would better help them meet high academic standards, and…

  18. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  19. The Effect of Kagan's Cooperative Structures on Speaking Skill of Iranian EFL Learners

    Directory of Open Access Journals (Sweden)

    Hassan Soleimani

    2018-03-01

    Full Text Available Speaking is an important skill in language learning and EFL learners sometimes face difficulties when they want to speak. This study attempted to measure the effect of Kagan’s cooperative structures on speaking skill of Iranian EFL learners. The participants were selected from EFL learners studying at Ideal Language Institute. The Cambridge English Language Assessment was administered in order to select homogenous participants. Forty eight adult female EFL learners were selected as intermediate learners based on their results of the language proficiency test. They were divided into two groups, 24 as the control group and 24 as the experimental group. A pre-test was administered to both groups at the beginning of the experiment then, the students participated in 90 minute classes two times a week for eight sessions. At the end of the experiment, a post-test was assigned to both groups to determine whether the Kagan’s cooperative structures had positively affected the students’ speaking skills. The normality of data was tested through Skewness, Kurtosis, and K-S. To make sure the participants were homogenous, the parametric statistical technique of independent -samples t-test was calculated between the pre-tests of both groups and they were homogenous. Independent-samples t-test between the posttests of the experimental group and the control group was calculated and it showed that the participants of the experimental group outperformed the subjects of the control group. Moreover, paired-samples ttest between the pre-test and post-test of the experimental group was calculated and it was shown that the experimental participants progressed from the pre-test to the post-test. The study revealed that: (1 Kagan’s cooperative structures had a positive effect on the students’ speaking skills, (2 the experimental group obtained higher scores in the post-test than in the pre-test, making the difference between the pre-test and post-test scores

  20. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  1. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  2. Introduction to Reproduction: Online Education for the Millennial Learner.

    Science.gov (United States)

    Castle, Megan; Kick, Laura; Haseley, Heather; Wallach, Harlan; Woodruff, Teresa K

    2016-07-01

    Despite staggering rates of sexually transmitted infections and unplanned pregnancies, reproductive health education is not yet standardized across secondary or postsecondary curricula. The Women's Health Research Institute and Northwestern University Information Technology created Introduction to Reproduction, a massive open online course to encourage global students to learn the biological foundations of reproductive health. This digital education experience appeals to the Millennial learner and offers unique opportunities to explore topics in reproductive biology via lectures, animations, and three-dimensional anatomical illustrations. Data were collected anonymously from de-identified learners who elected to self-report on their experiences while completing the course as well as through Coursera datasets. Northwestern University's Institutional Review Board classified this research project as an exempt status due to the de-identified nature of the collected data. Participants from 47 countries report on reproductive health content knowledge, past reproductive health education, and level of engagement with the topic. These data indicate that the Introduction to Reproduction course has a meaningful impact on its participants and presents the information in a concise and accessible format. Distribution of this course to a wider audience is the goal for the program and important to the field of reproductive health. © 2016 by the Society for the Study of Reproduction, Inc.

  3. Whose voice matters? LEARNERS | Bansilal | South African Journal ...

    African Journals Online (AJOL)

    International and national mathematics studies have revealed the poor mathematics skills of South African learners. An essential tool that can be used to improve learners' mathematical skills is for educators to use effective feedback. Our purpose in this study was to elicit learners' understanding and expectations of teacher ...

  4. Learners' experiences of learning support in selected Western Cape schools

    Directory of Open Access Journals (Sweden)

    Olaniyi Bojuwoye

    2014-01-01

    Full Text Available The study explored Western Cape primary and secondary school learners' experiences regarding the provision and utilization of support services for improving learning. A qualitative interpretive approach was adopted and data gathered through focus group interviews involving 90 learners. Results revealed that learners received and utilized various forms of learning support from their schools, teachers, and peers. The learning support assisted in meeting learners' academic, social and emotional needs by addressing barriers to learning, creating conducive learning environments, enhancing learners' self-esteem and improving learners' academic performance.

  5. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    In this study, a fuzzy expert system Trust-Based Access Control (TBAC) model for improving the Quality of crowdsourcing using emotional affective computing is presented. This model takes into consideration a pre-processing module consisting of three inputs such as crowd-workers category, trust metric and emotional ...

  6. Integrating CERN e-groups into TWiki access control.

    CERN Document Server

    Jones, PL; Hoymr, N; CERN. Geneva. IT Department

    2010-01-01

    Wikis allow for easy collaborative editing of documents on the web for users located in different buildings, cities or even countries. TWiki culture lends to open free form editing and most pages are world readable and editable by CERN authenticated users, however access control is possible and is used to protect sensitive documents. This note discusses the integration of E-groups for authorisation purposes at CERN.

  7. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  8. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  9. Advancing Learner Autonomy in TEFL via Collaborative Learning

    Science.gov (United States)

    Jacobs, George M.; Shan, Tan Hui

    2015-01-01

    The present paper begins by situating learner autonomy and collaborative learning as part of a larger paradigm shift towards student-centred learning. Next are brief discussions of learner autonomy and how learner autonomy links with collaborative learning. In the main part of the paper, four central principles of collaborative learning are…

  10. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  11. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  12. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. The Effect of Flipped Model of Instruction on EFL Learners' Reading Comprehension: Learners' Attitudes in Focus

    Science.gov (United States)

    Karimi, Mehrnoosh; Hamzavi, Raouf

    2017-01-01

    The present study aimed at investigating the effect of flipped model of instruction on EFL learners' reading comprehension ability. Moreover, this study aimed at identifying EFL students' attitudes toward flipped model of instruction. To this end, 60 EFL learners studying at an accredited private language institute in Isfahan were first…

  14. Adaptive Diagrams: Handing Control over to the Learner to Manage Split-Attention Online

    Science.gov (United States)

    Agostinho, Shirley; Tindall-Ford, Sharon; Roodenrys, Kylie

    2013-01-01

    Based on cognitive load theory, it is well known that when studying a diagram that includes explanatory text, optimal learning occurs when the text is physically positioned close to the diagram as it eliminates the need for learners to split their attention between the two sources of information. What is not known is the effect on learning when…

  15. An investigation into the impact of reflective teaching on EFL learners autonomy and intrinsic motivation

    Directory of Open Access Journals (Sweden)

    Elahe Fallah

    2015-12-01

    Full Text Available This study has sought to explore the effect of reflective teaching on learner autonomy and the intrinsic motivation of Iranian upper-intermediate female learners. The subjects included 60 adult upper-intermediate EFL learners chosen out of ninety, based on the scores obtained through administration of the TOEFL exam. They were randomly assigned to two groups: a the experimental group - taught by a reflective teacher - and b the control group instructed by an unreflective teacher. The motivation questionnaire and the autonomy questionnaire were administered to both groups to make sure that the two groups were not significantly different in terms of the level of motivation and autonomy. The experimental group was then taught by the reflective teacher and the control group was taught by the unreflective teacher who adopted no tangible reflective actions. Finally, both groups sat for motivation and autonomy questionnaires. The results indicate that reflective teaching leads to the enhancement of both learners’ autonomy and the intrinsic motivation level.

  16. South African law and policy regulating learner absenteeism

    African Journals Online (AJOL)

    Packard Bell

    Learner absenteeism often occurs involuntarily due to learners' social and economic circumstances. ..... still a child; e.g. under 18 years of age, and ... schools to take the age and maturity of the ... 5). The Policy on Learner Attendance (DBE, RSA,. 2010, para. 13(i)) allows the ..... Emotional literacy and the ecology of.

  17. Online Games for Young Learners' Foreign Language Learning

    Science.gov (United States)

    Butler, Yuko Goto; Someya, Yuumi; Fukuhara, Eiji

    2014-01-01

    Young learners' use of instructional games in foreign language learning is not yet well understood. Using games that were part of the learning tools for an online assessment, Jido-Eiken, a standardized English proficiency test for young learners in Japan, we examined young learners' game-playing behaviours and the relationship of these behaviours…

  18. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  19. Learners’ perceptions of learners regarded as having a homosexual orientation in an independent secondary school environment

    Directory of Open Access Journals (Sweden)

    Hendrik P. Mostert

    2012-10-01

    Full Text Available In schools today discrimination based on sexual orientation takes place on a regular basis. This form of discrimination leads to aggression towards learners perceived to be homosexual, as well as towards those with a homosexual orientation. For more than 15 years South Africa has been a democratic country with laws that protect learners who have a homosexual orientation. Nevertheless, aggression and discrimination towards these learners still occur in schools. Aggression often leads to verbal and physical bullying of the victims by perpetrators. The objectives of this research were to explore and describe Grade 11 learners’ experiences of aggression towards learners perceived to be homosexual as well as those with a homosexual orientation in an independent secondary school environment. The research design was qualitative, exploratory, descriptive and contextual in nature. The data for this investigation consisted of essays based on a published newspaper photograph, phenomenological group interviews, observations and field notes. Tesch’s method of data analysis was used, and an independent coder assisted. Three themes were identified, discussed and supported by a literature control: that learners experience that it is right and acceptable to have a homosexual orientation; that they experience ambivalence towards homosexual orientation of learners; and experienced feelings that it is wrong to have a homosexual orientation. Recommended guidelines are provided to address aggression towards learners perceived to be homosexual and those with a homosexual orientation.

  20. Opinions of Elementary Level EFL Learners on The Use of Weblogs

    Directory of Open Access Journals (Sweden)

    Ilknur ISTIFCI

    Full Text Available Technology is an indispensable part of our lives and education cannot be taught without it. Since technology is in every part of our lives, foreign language education also makes use of the new technology. By the use of the Internet, virtual classrooms and materials are easy to access and learning takes place beyond the boundaries of the classrooms. Weblogs or blogs are one of the tools that are used to teach language skills in EFL courses and students have a chance to reflect on what they wrote in the blogs. The aim of this study is to find the opinions of elementary level EFL learners on using weblogs and distance education. The subjects of the study were 10 Native speakers of English in London and 15 Turkish EFL learners who are learning English in the School of Foreign Languages. Turkish EFL learners created a class blog and every week they were given assignments by their class teacher. They wrote paragraphs and they gave and receive feedback on their writing in terms of content, vocabulary and grammar by their classmates and by native English speakers in a virtual environment. This procedure lasted for 6 weeks. At the end of 6 weeks, students were given an evaluation questionnaire and they were asked to write their opinions about using weblogs. They were also interviewed by their teacher and the opinions of the students were categorized. Findings indicate that the students found the idea of weblogs as a distant learning tool motivating, enjoyable and encouraging.

  1. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  2. BROA: An agent-based model to recommend relevant Learning Objects from Repository Federations adapted to learner profile

    Directory of Open Access Journals (Sweden)

    Paula A. Rodríguez

    2013-03-01

    Full Text Available Learning Objects (LOs are distinguished from traditional educational resources for their easy and quickly availability through Web-based repositories, from which they are accessed through their metadata. In addition, having a user profile allows an educational recommender system to help the learner to find the most relevant LOs based on their needs and preferences. The aim of this paper is to propose an agent-based model so-called BROA to recommend relevant LOs recovered from Repository Federations as well as LOs adapted to learner profile. The model proposed uses both role and service models of GAIA methodology, and the analysis models of the MAS-CommonKADS methodology. A prototype was built based on this model and validated to obtain some assessing results that are finally presented.

  3. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  4. Identifying Successful Learners from Interaction Behaviour

    Science.gov (United States)

    McCuaig, Judi; Baldwin, Julia

    2012-01-01

    The interaction behaviours of successful, high-achieving learners when using a Learning Management System (LMS) are different than the behaviours of learners who are having more difficulty mastering the course material. This paper explores the idea that conventional Learning Management Systems can exploit data mining techniques to predict the…

  5. LEARNER AUTONOMY ON ESSAY WRITING ACCURACY

    Directory of Open Access Journals (Sweden)

    Mohammad Hafidz

    2018-01-01

    Full Text Available Abstract: Learner autonomy on writing is independently teaching and learning that keeps students’ control to explore their knowledge and experiences in written language, find out and evaluate their errors based on the conceptual courses to make accurately simple essay. The aim was to know the effectiveness of the learner autonomy on writing accuracy. This quantitative research conducted in one group pretest and posttest design. The number of samples was 21 students in Bangkalan. The instrument were tests to gain students’ writing score before and after treatment. Researcher statistically analyzed the data using SPSS 23 version by running a Paired Samples Test. The result shown the means of pretes score was 66,83 and posttest score was 74,57, Paired Samples Correlations was 0,614 (strong correlation. Significance was 0,005, it means that  a (0,05 is higher than r value (0,005 with high variance of mean value (14,091. As a result, the hypothesis (H1­ was received that learner autonomy contributed effectively to learners’ in organizing own ideas (Ene, 2006 such as making a topic  map becomes some explanable sub-topics, writing down main and supporting idea, clustering some objects, editing next and learners  absolutely accumulate some selected vocabularies inappropriate topics  (Chengping W, 2008. Keyword: Learner Autonomy, Learning process, outcomes Absrak: Pembelajaran otonomi  adalah pembelajaran mandiri yang mengontrol mahasiswa untuk menyampaikan gagasan dan pengalamannya, mencatat dan mengevaluasi kesalahan yang terjadi dalam penulisan esai sederhana berdasarkan pembelajaran yang tersetruktur. Tujuan adalah untuk mengetahui efektifitas pembelajaran otonomi terhadap akurasi tulisan secara statistik. Penelitian ini dilakukan dengan menggunakan desain tes awal dan akhir. Jumlah sampel terdiri dari 21 siswa di Bangkalan. Isntrumen yang digunakan adalah tes untuk mengetahui hasil nilai mahasiswa sebelum dan sesudah melakukan

  6. The interplay of locus of control and academic achievement among Iranian English foreign language learners

    Directory of Open Access Journals (Sweden)

    Mahbubeh Yazdanpanah

    2010-09-01

    Full Text Available This study sought to look at the relationship between locus of control (LOC orientation and academic achievement (ACH ofuniversity-age English Foreign Language (EFL learners. LOC is the extent to which individuals attribute their achievementseither to external influences such as fate or to their own efforts. The sample for the study included 120 students studyingEnglish literature at the department of Foreign Languages and Linguistics of Shiraz University. They were chosen conveniently,on a voluntary basis, from the sophomores, juniors, and seniors. The instrument used was the revised version of LOCquestionnaire (Rotter, 2003 which identifies orientations of internality or externality. The participants' grade point averageswere the measure of their ACH. A number of statistical analyses such as Pearson product-moment correlation, the regressionanalysis, and the T-tests for the independent samples were performed on the data to achieve the objectives of the study. Thefindings of this study revealed that (a the LOC and the socio-economic status (SES have significant relationships with theuniversity EFL students' ACH (b the LOC is a good predictor of the participants' ACH (c the internals perform at higher levels ofachievement than the externals (d there is a significant difference between mid/high SES-students and low SES-students in LOCorientation (e the external students with a mid/high SES achieve significantly lower averages than the external students with alow SES, but the internal students with a mid/high SES achieve only a little lower averages than the internal students with a lowSES (f the internals' grades for the general and the major courses have significant relationships with their LOC, but this is not sofor the externals (g the age and the year of the study do not have significant relationships with LOC and with ACH (h there isno main difference between male and female participants in LOC orientation (i and finally, there is not a

  7. Learners' experiences of learning support in selected Western Cape ...

    African Journals Online (AJOL)

    The learning support assisted in meeting learners' academic, social and emotional needs by addressing barriers to learning, creating conducive learning environments, enhancing learners' self-esteem and improving learners' academic performance. Keywords: academic needs; academic performance; barriers to learning; ...

  8. When Is an English Language Learner Not an English Language Learner? Exploring Individual Differences in Developmental Language and Literacy Acquisition for At-Risk Learners: A Latent Transition Approach

    Science.gov (United States)

    Guzman-Orth, Danielle Alicia

    2012-01-01

    Empirical evidence suggests oral language proficiency is correlated with literacy outcomes; however, the relationship between oral language proficiency and literacy outcomes for English Language Learners is highly variable. As a result, the field lacks critical direction to identify children who are English Language Learners experiencing general…

  9. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  10. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  11. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  12. LANGUAGE LEARNING ACTIVITIES OF DISTANCE EFL LEARNERS IN THE TURKISH OPEN EDUCATION SYSTEM AS THE INDICATOR OF THEIR LEARNER AUTONOMY

    Directory of Open Access Journals (Sweden)

    Dilek ALTUNAY

    2013-10-01

    Full Text Available This study investigates the noncompulsory language learning activities performed by a group of distance EFL learners in the Turkish Open Education System. Performance of these activities has been considered as an indicator of their learner autonomy. The data were collected through an online questionnaire and interviews. The study shows that in general learners do not demonstrate autonomous language learning behaviour. They prefer learning English in a relaxed environment particularly by engaging in entertaining activities, and through note-taking. However, they do not have sufficient interaction with their facilitator, other learners or speakers. Although the participants are distance learners, they do not prefer Internet-based activities. Conditions stemming from adulthood, lack of skills necessary to perform an activity, lack of awareness of some activities and learners’ experiences in their previous years of education are some of the reasons for their unautonomous behaviour. The article also includes suggestions for teaching and future research.

  13. Implementing learnerships: learner recruitment and selection B ...

    African Journals Online (AJOL)

    Implementing learnerships: learner recruitment and selection B lessons learnt from the KwaZulu-Natal pilot projects. ... 2001 in KwaZulu-Natal, with specific reference to the recruitment and selection of learners. ... AJOL African Journals Online.

  14. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  15. E-learning for medical education: reflections of learners on patients.

    Science.gov (United States)

    Walsh, Kieran

    2018-01-01

    There is a growing research interest in how healthcare professionals learn online. This paper reports an analysis of reflections that relate to patients from users of an e-learning resource, BMJ Learning. Healthcare professionals who use BMJ Learning are encouraged to reflect on their learning. Over one year, all of the learners' reflections that related to patients were captured by the programme's software and were analysed using thematic analysis. A number of key themes emerged from this analysis: many learners reflected on patients in the context of their disease; many learners reflected on how they had put their learning into action or planned to put their learning into action for the benefit of patients; many learners reflected on how they would pass on what they had learned to patients; learners greatly appreciated patients contributing to the learning. Learners predominantly reflect about patients in the context of their disease. The reflections demonstrate that learners are keen to put their learning into action for the benefit of their patients. Learners' reflections show a keen interest in the patient-centredness of the learning resources.

  16. Reading comprehension and its underlying components in second-language learners: A meta-analysis of studies comparing first- and second-language learners.

    Science.gov (United States)

    Melby-Lervåg, Monica; Lervåg, Arne

    2014-03-01

    We report a systematic meta-analytic review of studies comparing reading comprehension and its underlying components (language comprehension, decoding, and phonological awareness) in first- and second-language learners. The review included 82 studies, and 576 effect sizes were calculated for reading comprehension and underlying components. Key findings were that, compared to first-language learners, second-language learners display a medium-sized deficit in reading comprehension (pooled effect size d = -0.62), a large deficit in language comprehension (pooled effect size d = -1.12), but only small differences in phonological awareness (pooled effect size d = -0.08) and decoding (pooled effect size d = -0.12). A moderator analysis showed that characteristics related to the type of reading comprehension test reliably explained the variation in the differences in reading comprehension between first- and second-language learners. For language comprehension, studies of samples from low socioeconomic backgrounds and samples where only the first language was used at home generated the largest group differences in favor of first-language learners. Test characteristics and study origin reliably contributed to the variations between the studies of language comprehension. For decoding, Canadian studies showed group differences in favor of second-language learners, whereas the opposite was the case for U.S. studies. Regarding implications, unless specific decoding problems are detected, interventions that aim to ameliorate reading comprehension problems among second-language learners should focus on language comprehension skills.

  17. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  18. Metaphorical Awareness: A New Horizon in Vocabulary Retention by Asian EFL Learners

    Directory of Open Access Journals (Sweden)

    Natasha Pourdana

    2014-07-01

    Full Text Available The present study investigates the impact of English metaphorical awareness on the vocabulary retention by 60 intermediate EFL learners in Iran. Participants in this study were all English as a Foreign language (EFL learners placed in the intermediate level of both genders ranging from 16 to 20 years of age at Qeshm language institute, Kerman, Iran. An Oxford Placement Test (OPT was administered to homogenize the participants and divided them into two intact experimental and control groups. The experimental group was exposed to and performed on 20 minutes English metaphorical awareness tasks of Pictorial Idioms, Poems, and Matching in sixteen 90-minute sessions. The controllgroup received the vocabulary exercises in New Cutting Edge (3rd Edition (Cunningham, Moor & Eales 2007 in turn The experimental group outperformed the controlgroup in this study.  In an independent sample t-Test, and a high effect size (Cohn’s d=2.84 supported the positive impact of metaphorical awareness on EFL learners' vocabulary retention.

  19. Which Dictionary? A Review of the Leading Learners' Dictionaries.

    Science.gov (United States)

    Nesi, Hilary

    Three major dictionaries designed for learners of English as a second language are reviewed, their elements and approaches compared and evaluated, their usefulness for different learners discussed, and recommendations for future dictionary improvement made. The dictionaries in question are the "Oxford Advanced Learner's Dictionary," the…

  20. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  1. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  2. A Predictive Study of Learner Attitudes Toward Open Learning in a Robotics Class

    Science.gov (United States)

    Avsec, Stanislav; Rihtarsic, David; Kocijancic, Slavko

    2014-10-01

    Open learning (OL) strives to transform teaching and learning by applying learning science and emerging technologies to increase student success, improve learning productivity, and lower barriers to access. OL of robotics has a significant growth rate in secondary and/or high schools, but failures exist. Little is known about why many users stop their OL after their initial experience. Previous research done under different task environments has suggested a variety of factors affecting user satisfaction with different types of OL. In this study, we tested a regression model for student satisfaction involving students' attitudes toward OL usage. A survey was conducted to investigate the critical factors affecting students' achievements and satisfaction in OL of robotics with use of own developed direct manipulation learning environment as learning context. A multiple regression analyses were carried out to investigate how different facets of students' expectations and experiences are related to perceived learning achievements and course satisfaction. Descriptive statistics and analysis of variance was performed to determine the effect of predictor variables to student satisfaction. The results demonstrate that students have significantly positive perceptions toward using OL of robotics as a learning-assisted tool. Furthermore, behavioral intention to use OL is influenced by perceived usefulness and self-efficacy. The following five major categories of satisfaction factors with OL course were revealed during analysis of the studies (effect sizes in parentheses): organization (0.69); implementation (0.61); professional content (0.53); interaction (0.43); self-efficacy (0.14). All these effect sizes were judged to be significant and large. The results also showed that learner-mentor/instructor interaction, learner-professional content interaction, and online and offline self-efficacy were good predictors of student satisfaction and course quality. Peer interactions and

  3. The effects of data-driven learning activities on EFL learners' writing development.

    Science.gov (United States)

    Luo, Qinqin

    2016-01-01

    Data-driven learning has been proved as an effective approach in helping learners solve various writing problems such as correcting lexical or grammatical errors, improving the use of collocations and generating ideas in writing, etc. This article reports on an empirical study in which data-driven learning was accomplished with the assistance of the user-friendly BNCweb, and presents the evaluation of the outcome by comparing the effectiveness of BNCweb and a search engine Baidu which is most commonly used as reference resource by Chinese learners of English as a foreign language. The quantitative results about 48 Chinese college students revealed that the experimental group which used BNCweb performed significantly better in the post-test in terms of writing fluency and accuracy, as compared with the control group which used the search engine Baidu. However, no significant difference was found between the two groups in terms of writing complexity. The qualitative results about the interview revealed that learners generally showed a positive attitude toward the use of BNCweb but there were still some problems of using corpora in the writing process, thus the combined use of corpora and other types of reference resource was suggested as a possible way to counter the potential barriers for Chinese learners of English.

  4. "The Open Library at AU" (Athabasca University): Supporting Open Access and Open Educational Resources

    Science.gov (United States)

    Elliott, Colin; Fabbro, Elaine

    2015-01-01

    To address challenges that learners, course creators, librarians and academics involved with OER and MOOCs are facing when looking for scholarly materials, Athabasca University Library has initiated the development of "the Open Library at AU." This open library is a full library website that provides easy access to open and free…

  5. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  6. Nurturing gifted learners in Mainland China

    DEFF Research Database (Denmark)

    Shi, Jiannong; Zhang, X.; Chen, N.

    2013-01-01

    -socio-intellectual model, illustrated the nature of human being and the nature of gifted learners. From the perspective of the BSI model, the authors suggested three aspects are very critical to curriculum design to meet the needs of gifted education: physical maturation or physical development, social maturation......In this article, based on the previous researches on the development of gifted learners, the authors summarized the problems in nurturing gifted learners due to lacking of the appropriate educational philosophy and educational methodology in Mainland China. The authors proposed the Bio...... or social and interpersonal development, and mental maturation or intellectual development. It was proved that BSI model has its theoretical rationality and practical validity in Mainland China...

  7. Learning Potentials of the Ubiquitous Internet: Using Mobile Devices to Support the Individual, Social and Physical Context of the Learner

    Science.gov (United States)

    Dalsgaard, Christian; Pedersen, Nicholai Friis; Aaen, Janus Holst

    2013-01-01

    The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From a sociocultural perspective the paper discusses different ways…

  8. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  9. Investigating Language Learning Activity Using a CALL Task in the Self-access Centre

    Directory of Open Access Journals (Sweden)

    Carlos Montoro

    2011-09-01

    Full Text Available This article describes a small study of the language learning activity of individual learners using a CALL task in a self-access environment. The research focuses on the nature of the language learning activity, the most salient elements that make up its structure and major disturbances observed between and within some of those elements. It is set in the context of computer-assisted language learning (CALL and activity theory. A CALL task designed by the authors was made available online to be used as a research and learning tool. Empirical data was collected from two participants using ethnographic tools, such as participant observation and stimulated recall sessions. The analysis focuses on disturbances mainly involving the subject (i.e., the learner, mediating artefacts (e.g., the CALL task, the community (e.g., management and other self-access centre users and the object of the activity (i.e., learning English. It is recommended that future studies should look deeper into contradictions in the learning activity from a cultural-historical perspective.

  10. Language diversity in the mathematics classroom: does a learner ...

    African Journals Online (AJOL)

    In this study, the researchers developed an 'aid' that would assist learners to relate mathematics terms and concepts in English with terms in their own languages. The study determined whether a visual multilingual learner companion brought change in learners' performance in mathematics. Also what the educators' views ...

  11. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  12. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  13. Literacy development of English language learners: The outcomes of an intervention programme in grade R

    Directory of Open Access Journals (Sweden)

    Anna-Mari Olivier

    2010-12-01

    Full Text Available This study aims to contribute to the knowledge base on the status and development of emergent literacy skills of learners receiving formal education in their second or additional language. The focus is on young English language learners (ELLs, i.e. learners whose home language is not English but who have English as their language of teaching and learning. This article reports on a study that investigated ELLs’ emergent literacy skills prior to entering grade 1 and then evaluated the effectiveness of an evidence-based stimulation programme on early literacy skills in the South African context. Using a quasi-experimental design, ELLs’ emergent literacy skills were assessed with an adapted version of 8 of the subtests of the Emergent Literacy Assessment battery (Willenberg, 2004 and were compared to those of English first language (L1 and of ELL control groups, both before and after the 8-week purpose-designed programme. While learners showed significant improvement on 6 of the 8 subtests, the programme did not significantly improve ELLs’ skills in comparison to those of the control groups. Possible independent variables contributing to the dearth of intervention effect include socio-economic status, learners’ L1, and teacher- and classroom-specific characteristics, all of which were considered in this study. Clinical implications for speech-language therapists with regard to assessment, intervention, service delivery and outcome measures are highlighted.

  14. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  15. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  16. Dynamics of learner affective development in early FLL

    Directory of Open Access Journals (Sweden)

    Jelena Mihaljević Djigunović

    2012-10-01

    Full Text Available Affective learner factors were first considered as a cause of success in language learning. This was followed by a change in approach and recently authors (e.g., Edelenbos, Johnstone, & Kubanek, 2006 have considered them an important outcome, especially in early foreign language learning (FLL. Current research into affective learner factors in early FLL tries to catch the developmental aspects too, and studies are emerging that take a contextual view as well. This paper describes a study on affective characteristics of young FL learners that combines the developmental and contextual perspectives. Using the case study methodology the author analyses the affective profiles of three young learners of English as a foreign language who were followed for 4 years. The analyses are done taking into account their immediate language learning environment, home support, out-of-school exposure to English and language achievement. The findings suggest that affective learner factors contribute to the dynamic complexity of early FLL.

  17. Editorial. Special issue on strategies and self-regulation in self-access learning

    Directory of Open Access Journals (Sweden)

    Heath Rose

    2012-12-01

    Full Text Available Learner strategy and self-regulation theory have been in a state of flux in recent years, and this is an exciting time to share new ideas, conceptualizations and models of research in order to move the field forward. Therefore, the editor was eager to pursue a special issue where emerging voices in these fields could be heard, and these new ideas could be shared. The representation of strategic learning in recent conferences is indicative of a growing trend in the field to move towards a self-access and learner autonomy perspective. There is great potential to share knowledge between these fields. This special issue brings these fields, which have already been gravitating together, closer in a more concrete and published format.

  18. Learner Analysis Framework for Globalized E-Learning: A Case Study

    Directory of Open Access Journals (Sweden)

    Mamta Saxena

    2011-06-01

    Full Text Available The shift to technology-mediated modes of instructional delivery and increased global connectivity has led to a rise in globalized e-learning programs. Educational institutions face multiple challenges as they seek to design effective, engaging, and culturally competent instruction for an increasingly diverse learner population. The purpose of this study was to explore strategies for expanding learner analysis within the instructional design process to better address cultural influences on learning. A case study approach leveraged the experience of practicing instructional designers to build a framework for culturally competent learner analysis.The study discussed the related challenges and recommended strategies to improve the effectiveness of cross-cultural learner analysis. Based on the findings, a framework for conducting cross-cultural learner analysis to guide the cultural analysis of diverse learners was proposed. The study identified the most critical factors in improving cross-cultural learner analysis as the judicious use of existing research on cross-cultural theories and joint deliberation on the part of all the participants from the management to the learners. Several strategies for guiding and improving the cultural inquiry process were summarized. Barriers and solutions for the requirements are also discussed.

  19. Language, Learners and Levels. Progression and Variation

    NARCIS (Netherlands)

    Haan, P.J.M. de; Vries, C.M. de; Vuuren, S. van

    2017-01-01

    Learner Corpus Research (LCR) is a vibrant discipline, which combines methodological rigour in the analysis of authentic learner data with a focus on practical pedagogical application. Following earlier successful conferences in Louvain and Bergen, the third LCR conference, hosted by Radboud

  20. Marshaling Resources: A Classic Grounded Theory Study of Online Learners

    Directory of Open Access Journals (Sweden)

    Barbara Yalof

    2014-06-01

    Full Text Available Classic grounded theory (CGT was used to identify a main concern of online students in higher education. One of the main impediments to studying online is a sense of isolation and lack of access to support systems as students navigate through complex requirements of their online programs. Hypothetical probability statements illustrate the imbalance between heightened needs of virtual learners and perceived inadequate support provided by educational institutions. The core variable, marshaling resources, explains how peer supports sustain motivation toward successful program completion. Understanding the critical contribution virtual interpersonal networks make towards maximizing resources by group problem solving is a significant aspect of this theory. Keywords: Online learning, e-learning, personal learning networks, peer networks

  1. Teaching strategies to support isiXhosa learners who receive ...

    African Journals Online (AJOL)

    how learners acquire learning, there is still a dearth of material on descriptions of current support provided to learners within the theoretical ... schools where the Language of Learning and Teaching (LOLT) is English and/or Afrikaans (i.e. the learner's second or third .... Languages (IIAL) policy for public comment. This.

  2. Action towards hope: Addressing learner behaviour in a classroom

    Directory of Open Access Journals (Sweden)

    Raelene LeeFon

    2013-11-01

    Full Text Available Unruly learners and disciplinary problems are an intractable part of every teacher’s teaching experience. It appears that, even though most schools have enacted a code of conduct to regulate learner behaviour, this does not always have the desired effect. Disciplinary problems in schools impact negatively on the teaching and learning environment as well as on teachers’ personal and professional well-being and morale. Framed within the context of a biblical worldview, this article narrates the experiences of one teacher who decided to take action towards hope. The situation in her classroom was quite desperate with learners coming to school unprepared and behaving very badly and parents being uninterested in the performance of their children at school. She realised that she could not change the learners or their parents unless she started with herself. In this context, she, as a postgraduate student under the supervision of the co-authors, embarked on an action-research project to promote positive learner behaviour. By collaborating with the learners on a set of classroom rules, engaging in reflective teaching and changing her own behaviour towards the learners, the situation in her classroom improved. Based on her experiences, this article argues that teachers should empower themselves with knowledge and a better understanding of the concept of discipline rather than viewing the classroom as a battlefield. It is important to acknowledge and show respect and appreciation for each learner in his or her own context.

  3. Supporting learner-centered technology integration through situated mentoring

    Science.gov (United States)

    Rosenberg, Marian Goode

    Situated mentoring was used as a professional development method to help 11 high school science teachers integrate learner-centered technology. The teachers' learner-centered technology beliefs and practices as well as their perception of barriers to learner-centered technology integration were explored before and after participating in the mentoring program. In addition, the participants' thoughts about the effectiveness of various components of the mentoring program were analyzed along with the mentor's observations of their practices. Situated mentoring can be effective for supporting learner-centered technology integration, in particular decreasing the barriers teachers experience. Goal setting, collaborative planning, reflection, and onsite just-in-time support were thought to be the most valuable components of the mentoring program.

  4. The Impact of Cooperative Learning on Tertiary EFL Learners' Motivation

    Science.gov (United States)

    Ning, Huiping; Hornby, Garry

    2014-01-01

    This study was aimed at investigating the impact of cooperative learning on the motivation of tertiary English learners. Participants were from two randomly assigned classes at a university in the north of China. A pre-test-post-test control group design was employed to compare the impact of the cooperative learning approach with that of…

  5. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    Administrator

    participant observation of gender roles and relations in the study community. ..... in domestic and public spheres, access to and control over locally available ...... Proposal on Leadership Initiatives in Awra Amba Community Case Study on.

  6. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0....... The main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...

  7. Relational aggression: the voices of primary school learners

    Directory of Open Access Journals (Sweden)

    Johan Botha

    2014-06-01

    Full Text Available The aim of this research was to explore and describe primary school learners' experiences of relational aggression at school. This was done within a qualitative research design with a phenomenological approach. In order to give a voice to primary school learners' lived experiences of relational aggression, 25 individual interviews were conducted with a purposeful sample of learners from two primary schools in the Dr Kenneth Kaunda District, North-West Province. Data analysis was done using Tesch's systematic open coding process. Social Learning Theory underscored the theoretical foundation that emphasises relational aggression as a socially learned phenomenon through observation. Although existing theory supports the findings, the reality, however, is that the effects of relational aggression impede negatively on learners' social and academic development and well-being. This jeopardises schools' endeavours to effectively socialise learners in order to establish and maintain effective personal and social relationships. Curtailing relational aggression has the possibility of reducing other forms of aggression in schools and will enhance the creation of effective teaching-learning environments that are conducive to teaching and learning that will support the task of schooling, which is the socialisation of learners to optimally achieve their potential in schools. The article provides some suggestions to assist teachers in endeavours to effectively curtail relational aggression.

  8. Sexual risk behaviours of high school female learners in Mbonge subdivision of rural Cameroon.

    Science.gov (United States)

    Tarkang, Elvis Enowbeyang

    2015-01-01

    Since female learners in high schools in Cameroon fall within the age group hardest hit by HIV/AIDS, it is assumed that these learners might be exposed to sexual risk behaviours. However, little has been explored on the sexual risk behaviours of high school female learners in Cameroon. This study aimed at examining the sexual risk behaviours of high school female learners in Mbonge subdivision of rural Cameroon. A cross sectional design was adopted, using a self-administered questionnaire for data collection. Respondents were selected through disproportional stratified simple random sampling resulting in 210 female grade 10 to grade 12 learners from three participating high schools in Mbonge subdivision, Cameroon. Descriptive and inferential statistics were calculated using SPSS version 20 software program. Majority of the respondents, 54.0% reported being sexually active, of whom only 39.8% used condoms during first sex; 49.5% used condoms during last sex and 29.6% used condoms consistently. Up to 32% of the sexually active respondents had multiple sexual partners in the past one year before the study, while 9.3% had multiple sexual partners during the study period. The mean age of first sex was 15.6 years. Lack of parental control, religion, academic profile, poverty, place of residence and perception of risk of HIV infection were the main factors significantly associated with sexual risk behaviours. The findings indicate that sexual risk behaviours exist among high school female learners in Mbonge, Cameroon. There is need for campaigns and interventions to bring about sexual behaviour change.

  9. Using Learner Corpora for L2 Lexicography: Information on ...

    African Journals Online (AJOL)

    In this paper, we describe an on-going project of the corpus of EFL (English as a Foreign Language) learners in Japan and its application for pedagogical dictionary compilation. We especially focus on the learners' errors in verb collocation patterns and describe how the leamer's dictionary can benefit from the learners' ...

  10. Educating to the seismic risk with the community of learners

    Science.gov (United States)

    Miranda, Nicola

    2013-04-01

    The web has a lot of information available for teachers about seismology both at informal and at a scientific level. The average student, who approaches the study of seismology for the first time, lacks direct involvement in the study and it often happens that the simple informal knowledge does not result in learning and formalization. The teacher who wants to use web resources for the didactics, finds it is difficult to select information and adapt it to the school level, because of the short weekly time reserved for earth science studies. The seismologist, who gives a lecture in the school, has difficulty to understand how much of the knowledge transmitted will pass to the students. A way to solve these problems is to adopt the Community of Learners' method, creating groups of different-aged students directly involved in research activities and in the production of learning material, using websites organized for web research, production and sharing of ideas, as Jigsaw methodology suggests. The poster shown documents the experience I had with a group of students (aged from 14 to 18) in an Italian high school in Somma Vesuviana, near Naples. The method adopted is adaptable to any kind of technical-scientific issue. In this case seismology was the topic of the work group and thanks to the Community of Learners' method, all the students: -Started as apprentices, learning new things, questioning their knowledge, accessing new sources, using different channels and means of communication and debating with the others; -Moved to the role of teachers, sharing their own knowledge with the others, and explaining their own discoveries; -Became scientists specialized in something unknown to the other students, producers of new and original ideas to explain to the others who had different opinions and ideas. Thanks to the Community of Learners, they all became apprentices, teachers and scientists.

  11. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  12. The Horse Before the Cart! The English Language Learners Experience of Using E-learning System

    Directory of Open Access Journals (Sweden)

    Mohammad Madallh Alhabahba

    2012-06-01

    Full Text Available This study examined the intention to use E-learning among EFL learners. A total of 147 English language learners responded to the survey, these students have access to E-learning system. The chief purpose of this paper aims to understand the factors that affect the students’ intention to use E-learning in Malaysian context. The findings of the study revealed that that perceived ease of use and perceived usefulness were able to be significant determinants of intention to use. Based on factor analysis, cognitive attitude and affective attitude were added to the modified framework as potential mediating factors. Moreover, cognitive attitude is fully mediating the relationship between perceived ease of use, perceived usefulness, and intention to use. Meanwhile, the study results indicated that the cognitive attitude is a significant determinant of intention to use. The study helps to understand the significant factors to explain, predicate and measure the acceptance of E-learning as a new tool of students learning process.

  13. Strategies to address learner aggression in rural South African secondary schools

    Directory of Open Access Journals (Sweden)

    Gunam D. Singh

    2013-11-01

    Full Text Available Managing learner aggression in the school system is central to learners’ academic performance and holistic development. In order to manage learner aggression, it is important to understand the contributory factors and the forms of learner aggression. This article reports on an investigation of factors contributing to learner aggression in rural secondary schools in the Empangeni district of KwaZulu-Natal in order to identify the forms of learner aggression and to establish strategies to manage such aggression in these secondary schools. A qualitative research design was adopted to investigate the phenomenon through an interview process with participants from five rural secondary schools. The findings showed that the factors contributing to learner aggression include family factors, environmental factors and school-related factors whilst the most common forms of learner aggression in schools are verbal aggression, physical aggression and bullying. The article concludes with the role that the school, parents and the Department of Education can play in addressing learner aggression in schools.

  14. Effects of Degree of Segmentation and Learner Disposition on Multimedia Learning

    Science.gov (United States)

    Doolittle, Peter E.; Bryant, Lauren H.; Chittum, Jessica R.

    2015-01-01

    The construction of asynchronous learning environments often involves the creation of self-paced multimedia instructional episodes that provide the learner with control over the pacing of instruction (segmentation); however, does the amount of segmentation impact learning? This study explored the effects of the degree of segmentation on recall and…

  15. ODL and the Impact of Digital Divide on Information Access in Botswana

    Directory of Open Access Journals (Sweden)

    Olugbade Oladokun

    2011-10-01

    Full Text Available Open and distance learning (ODL has created room for the emergence of virtual education. Not only are students found everywhere and anywhere undertaking their studies and earning their degrees, but geographical boundaries between nations no longer appear to have much relevance. As the new education paradigm irretrievably alters the way teaching and learning is conducted, the application of modern educational ICTs has a major role to play.With students of transnational or cross-border education dispersed into various nooks and crannies of Botswana, many others enlist for the “home-baked” distance learning programmes from their diverse locations. Like the face-to-face conventional students, distance learners also have information needs which have to be met. But blocking the distance learners’ realization of their information needs is the digital divide, which further marginalizes the underclass of “info-poor.”The survey method was used, and a questionnaire administered to 519 students of four tertiary level distance teaching institutions that met the criteria set for the study yielded a 70.1% response rate. The results showed that while the Government of Botswana has made considerable effort to ensure country-wide access to ICT, which now constitutes an effective instrument for meeting information needs, a number of problems still exist. The factors impeding easy access are unearthed. The findings of an empirical study portraying some learners as information-rich and others as information-poor, and the consequence of distance learners studying on both sides of the digital divide, are discussed. Suggestions on bridging the digital divide are offered.

  16. Learner Centered Classroom in Science Instruction: Providing Feedback with Technology Integration

    Science.gov (United States)

    Yilmaz, Ozkan

    2017-01-01

    "Learner centered" term points out environments that attention to the learners brings to the educational setting. This term includes teaching practices: effort to uncover what learners think in a specific problem on hand, talking about their misconceptions and, giving them situations to readjust their ideas. In Learner centered…

  17. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  18. Young Learner Perspectives on Four Focus-on-Form Tasks

    Science.gov (United States)

    Shak, Juliana; Gardner, Sheena

    2008-01-01

    Recent studies suggest that focus-on-form (FonF) instruction has a positive effect on the second language proficiency of young learners. However, few have looked at learner perspectives on different FonF tasks, particularly in those young learners. This study investigates children's attitudes towards four FonF task-types in three Primary 5 English…

  19. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  20. A Learner-led, Discussion-based Elective on Emerging Infectious Disease.

    Science.gov (United States)

    Mathias, Clinton

    2015-08-25

    Objective. To implement a learner-led, discussion-based course aimed at exposing second-year pharmacy learners to the study of emerging infectious diseases from a global health perspective and to assess the role and importance of pharmacists in the management of disease outbreaks. Design. Learners examined literature pertinent to an emerging infectious disease in a 3-credit, discussion-based course and participated in peer discussion led by a designated learner. Instructional materials included journal articles, audio-visual presentations, documentaries, book chapters, movies, newspaper/magazine articles, and other materials. Learning outcomes were measured based on the ability of learners to perform critical thinking and analysis, communicate with their peers, and participate in class discussions. Assessment. The course was offered to 2 consecutive cohorts consisting of 14 and 16 learners, respectively. Overall, every learner in the first cohort achieved a final grade of A for the course. In the second cohort, the overall grade distribution consisted of grades of A, B, and C for the course. Learner evaluations indicated that the active-learning, discussion-based environment significantly enhanced interest in the topic and overall performance in the course. Conclusion. The elective course on emerging infectious diseases provided in-depth exposure to disease topics normally not encountered in the pharmacy curriculum. Learners found the material and format valuable, and the course enhanced their appreciation of infectious diseases, research methodology, critical thinking and analysis, and their roles as pharmacists.

  1. HIV and AIDS knowledge and sexual behaviours amongst secondary school learners in Harare, Zimbabwe

    Directory of Open Access Journals (Sweden)

    Margaret Mlingo

    2012-07-01

    Most learners had obtained their HIV and AIDS knowledge from schools, but some did so from their parents, community activities, the radio or television. No learner had commenced with sexual activities and all had heard about HIV, but not all knew what HIV was, and even fewer could define AIDS. Less than one-third of the learners could mention the three most important HIV preventive measures. Most learners were willing to undergo voluntary counselling and testing (VCT, but few had done so. As no learner had commenced sexual activities, opportunities existed to empower Grade 8 (Form 1 learners with adequate HIV and AIDS knowledge. Generally the learners’ HIV and AIDS knowledge levels were high but some misconceptions existed. Schools should engage with radio and television programmes to address misconceptions about HIV and AIDS. Learners should be enabled to access VCT services. More effective HIV prevention education in Zimbabwe’s schools, could enable more youth to remain HIV negative. Opsomming Pogings om die Menslike Immuniteitsgebrekvirus (MIV en Verworwe immuniteits-gebreksindroom (VIGS pandemiese golf in Afrika te stuit, beklemtoon die noodsaaklikheid dat leerders ingeligte besluite moet kan neem. Alhoewel leerders in Zimbabwe se skole onderrig word oor MIV en VIGS, behoort die omvang van die kennis vasgestel te word. Die hoofdoelwit was om sekondêre skool leerders van Harare, Zimbabwe, se MIV en VIGS kennis te bepaal. Gestruktureerde onderhoude is gevoer met 75 Graad 8 (Vorm 1 sekondêre skool leerders van vier skole in Harare. Die meeste leerders het hulle MIV and VIGS kennis by skole opgedoen terwyl ‘n paar dit van hulle ouers, gemeenskapsaktiwiteite, die radio en televisie gekry het. Geen leerders het met seksuele aktiwiteite begin nie, almal het van MIV gehoor, maar nie almal het geweet wat MIV is nie, en nog minder kon VIGS definieer. Minder as een-derde kon die drie belangrikste MIV voorkomende maatreëls noem. Die meeste leerders was gewillig om

  2. Perti Net-Based Workflow Access Control Model%基于Perti网的工作流访问控制模型研究

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems.This paper shows how to make access control in workflow system.We give a workflow access control model (WACM) based on several current access control models.The model supports roles assignment and dynamic authorization.The paper defines the workflow using Petri net.It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM).Finally, an example of an e-commerce workflow access control model is discussed in detail.

  3. A career exploration programme for learners with special educational needs.

    Science.gov (United States)

    van Niekerk, Matty

    2007-01-01

    Learners with disabilities lag far behind their peers without disabilities in achievement, graduation rates, post-school education and employment outcomes [4]. Against the current state of education affairs in South Africa, where curriculum models for learners with special educational needs (LSEN) are still under revision, therapists and teachers are finding it difficult to prepare these learners for appropriate employment after school. Even where systems in education are established, persons with learning disabilities face more challenges to enter employment [5]. This article reports on a unique career exploration programme for grade 11 learners at a school for learners with special educational needs in Gauteng, South Africa. It is a collaborative strategy between the learners, their parents, a teacher and the occupational therapists at the school. Two case studies are described to indicate the success of the program.

  4. Scaffolding the design of accessible eLearning content: a user-centered approach and cognitive perspective.

    Science.gov (United States)

    Catarci, Tiziana; De Giovanni, Loredana; Gabrielli, Silvia; Kimani, Stephen; Mirabella, Valeria

    2008-08-01

    There exist various guidelines for facilitating the design, preparation, and deployment of accessible eLearning applications and contents. However, such guidelines prevalently address accessibility in a rather technical sense, without giving sufficient consideration to the cognitive aspects and issues related to the use of eLearning materials by learners with disabilities. In this paper we describe how a user-centered design process was applied to develop a method and set of guidelines for didactical experts to scaffold their creation of accessible eLearning content, based on a more sound approach to accessibility. The paper also discusses possible design solutions for tools supporting eLearning content authors in the adoption and application of the proposed approach.

  5. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  6. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  7. Video Self-Modeling for English Language Learners

    Science.gov (United States)

    Boisvert, Précille; Rao, Kavita

    2015-01-01

    Teachers of English language learners (ELLs), expected to address grade-level standards and prepare ELLs for standardized assessments, have the difficult task of designing instruction that meets the range of needs in their classrooms. When these learners have experienced limited or interrupted education, the challenges intensify. Whereas…

  8. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  9. THE ELUSIVENESS OF LEARNER-CENTRED TEACHING

    Directory of Open Access Journals (Sweden)

    Ervin Kovačević

    2016-03-01

    Full Text Available This research will explore teaching styles of university professors. Teaching style is an umbrella term for teaching decisions made during the entire teaching process – planning, delivery, and evaluation. Contemporary university teachers are advised to adopt the learner-centred teaching style which is assumed to produce remarkable possibilities. In the Fall Semester 2015 fifty-two respondents in different faculties of International University of Sarajevo were surveyed using The Principles of Adult Learning Scale inventory designed by Gary J. Conti. Inventory scores were calculated according to guidelines suggested by the author of the inventory. The scores revealed that majority of respondents strongly supported teacher-centred rather than learner-centred styles of instruction. Scores were analysed on gender lines and across three different faculties, namely: Arts and Social Sciences; Business and Administration; Engineering and Natural Sciences. In all five groups none of the seven teaching style indicators was found to conform with the learner-centred teaching criteria. There was no statistically significant difference between the two genders’ preference for a teaching style. And there was no statistically significant difference between teaching style preference across the three different faculties.The results of this research imply that the learner-centred style of instruction is not frequently implemented. Secondly, the results indicate that the requirements necessary for proper application of the learner-centred teaching style are not easy to meet in current written and unwritten norms. Finally, the results show that traditional teaching styles, which have been preserved in different scientific fields, still predominate in universities.

  10. LEARNER AUTONOMY IN THE INDONESIAN EFL SETTINGS

    Directory of Open Access Journals (Sweden)

    Nenden Sri Lengkanawati

    2017-01-01

    Full Text Available Learner autonomy in Indonesian educational institutions has not commonly been listed as a teaching-learning objective, and most teachers seem to be hardly acquainted with learner autonomy (LA.  Therefore, it is very essential  to conduct a study of LA as perceived and experienced by school teachers and to find out the importance of LA training for professional development. A questionnaire was used to collect the data about English teachers’ perceptions regarding LA and LA-based practices. In addition, an LA training was conducted to see its significance for professional development.  After the data were qualitatively and quantitatively analyzed, it was found that the participating teachers tended to maintain that autonomy should be inculcated among learners, and that the LA concept should not be misinterpreted as learning without a teacher. Concerning choices and decisions by  the learners, it was believed that learners’ making choices about how they learned and what activities they did, and involving them to decide what and how to learn could promote autonomy among learners. As regards LA-based teaching-learning practices, it was revealed that most teachers desired to implement LA principles in their teaching-learning contexts, although they identified that many of the LA principles were not that feasible to apply in their situation. It was also found that LA training could improve the teachers’ perceptions regarding LA concepts and principles. There were some constraints which could make learner autonomy difficult to develop among Indonesian learners in general: limited time allotted for the implementation of the curriculum, learners’ lack of autonomous learning experience, too much focus on national examinations, and insufficient proficiency of English.  LA-based teaching-learning practices were most desired; however, many were considered as having insufficient feasibility. In this respect, commitment is certainly the key to

  11. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  12. Between the Social and the Selfish: Learner Autonomy in Online Environments

    Science.gov (United States)

    Lewis, Tim

    2013-01-01

    This paper explores what it means to be an autonomous learner in an online social context. Using distinctions originally drawn by Jürgen Habermas, it argues that classic accounts of learner autonomy as teleological action are inadequate to explain learner activity in group settings. It points out that learners in such settings display attitudes…

  13. Specialised Translation Dictionaries for Learners

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2010-01-01

    Specialised translation dictionaries for learners are reference tools that can help users with domain discourse in a foreign language in connection with translation. The most common type is the business dictionary covering several more or less related subject fields. However, business dictionaries...... the needs of learners, it is proposed that specialised translation dictionaries should be designed as augmented reference tools. It is argued that electronic and printed dictionaries should include sections or CD-ROMs with syntactic, translation etc. data as well as exercises and illustrative documents...

  14. Experiences and Challenges of Evidence Leaders ("Prosecutors" in Learner Disciplinary Hearings in Public Schools

    Directory of Open Access Journals (Sweden)

    Anthony Smith

    2015-12-01

    Full Text Available After the abolition of corporal punishment at schools, teachers have been faced with an increase in unacceptable learner behaviour and threatening situations in their classrooms. An urgent need arose to address learner discipline in innovative ways. Disciplinary hearings that deal with cases of serious misconduct represent a shift away from authoritarian control towards a corrective and restorative approach. This article presents views of educators that had acted as evidence leaders (“ELs” at disciplinary hearings. Qualitative data was collected through semi-structured interviews in a district of the Gauteng Education Department. AtlasTi software was utilised to analyse the verbatim interview transcriptions. Educators that usually served as evidence leaders (“prosecutors”, but had not been trained in law, experienced problems in conducting quasi-judicial functions without proper support and training. ELs regularly experience animosity from parents and learners; are frustrated by the unwillingness and failure of the provincial education departments to act in accordance with an SGB recommendation. Disciplinary hearings are time-consuming and lawyers representing learners complicate rather than facilitate the process. These weaknesses jeopardise the efficacy and fairness of the process and may ultimately defeat the purpose of a disciplinary hearing.

  15. QoS-based experience-aware adaptation in multimedia e-learning - A learner, is a learner, is a user, is a customer

    OpenAIRE

    Moebs, Sabine

    2011-01-01

    One of the challenges for the future of technology-enhanced learning is the retention of learners. On-line learning environments should engage learners and provide an appropriate “Quality of Experience” (QoE). For more than a decade, adaptive hypermedia systems have been used to adapt content and instruction to individual knowledge, goals and preferences in an effort to engage learners. However, even if the content is highly engaging it can be very difficult to achieve good Quality ...

  16. Oral Computer-Mediated Interaction Between L2 Learners: It’s About Time!

    Directory of Open Access Journals (Sweden)

    Yanguas, Íñigo

    2010-10-01

    Full Text Available This study explores task-based, synchronous oral computer-mediated communication (CMC among intermediate-level learners of Spanish. In particular, this paper examines (a how learners in video and audio CMC groups negotiate for meaning during task-based interaction, (b possible differences between both oral CMC modes and traditional face-to-face (FTF communication, and (c how this oral computer mediated negotiation compares to that found in the text-based CMC literature. Fifteen learner-to-learner dyads were randomly assigned to an audio group, a video group, and a FTF control group to complete a jigsaw task that was seeded with 16 unknown lexical items. Experimental groups used Skype, free online communication software, to carry out the task. The transcripts of the conversations reveal that oral CMC groups do indeed negotiate for meaning in this multimedia context when non-understanding occurs between speakers. In addition, results showed differences in the way audio and video groups carry out these negotiations, which were mainly due to the lack of visual contact in the audio group. No differences were found between video and FTF groups. Furthermore, oral CMC turn-taking patterns were shown to be very similar to FTF patterns but opposite to those found in written synchronous CMC. Oral CMC interaction patterns are shown to be more versatile.

  17. Elderly Learners and Massive Open Online Courses: A Review.

    Science.gov (United States)

    Liyanagunawardena, Tharindu Rekha; Williams, Shirley Ann

    2016-01-07

    Massive open online courses (MOOCs) have become commonplace in the e-learning landscape. Thousands of elderly learners are participating in courses offered by various institutions on a multitude of platforms in many different languages. However, there is very little research into understanding elderly learners in MOOCs. We aim to show that a considerable proportion of elderly learners are participating in MOOCs and that there is a lack of research in this area. We hope this assertion of the wide gap in research on elderly learners in MOOCs will pave the way for more research in this area. Pre-course survey data for 10 University of Reading courses on the FutureLearn platform were analyzed to show the level of participation of elderly learners in MOOCs. Two MOOC aggregator sites (Class Central and MOOC List) were consulted to gather data on MOOC offerings that include topics relating to aging. In parallel, a selected set of MOOC platform catalogues, along with a recently published review on health and medicine-related MOOCs, were searched to find courses relating to aging. A systematic literature search was then employed to identify research articles on elderly learners in MOOCs. The 10 courses reviewed had a considerable proportion of elderly learners participating in them. For the over-66 age group, this varied from 0.5% (on the course "Managing people") to 16.3% (on the course "Our changing climate"), while for the over-56 age group it ranged from 3.0% (on "A beginners guide to writing in English") to 39.5% (on "Heart health"). Only six MOOCs were found to include topics related to aging: three were on the Coursera platform, two on the FutureLearn platform, and one on the Open2Study platform. Just three scholarly articles relating to MOOCs and elderly learners were retrieved from the literature search. This review presents evidence to suggest that elderly learners are already participating in MOOCs. Despite this, there has been very little research into their

  18. Learner Autonomy in Foreign Language Education and in Cultural Context

    OpenAIRE

    Ivanovska, Biljana

    2015-01-01

    The present paper is a brief review of the theoretical concepts about learner autonomy focusing on highlighting the main themes on learner autonomy in foreign language education and in cultural context as a globalized construct. These themes are based on the concepts of learner responsibility and independence, the importance of the autonomy in foreign language education in both the Western and Eastern style and the role of the culture in the concept of learner independence. The present study ...

  19. An Empirical Investigation into Nigerian ESL Learners ...

    African Journals Online (AJOL)

    General observations indicate that ESL learners in Nigeria tend to manifest fear and anxiety in grammar classes, which could influence their performance negatively or positively. This study examines empirically some of the reasons for some ESL learners' apprehension of grammar classes. The data for the study were ...

  20. Overview English Asa Second Language for Young Learners

    OpenAIRE

    Rini, Setia

    2016-01-01

    Young learners have special charactheristics hence the teachers of English as a Second language needs special strategy too. It is indicated that the increas of abilities to learn second language is started from the early age. We can imagine when the teachers do not use and apply appropriate teaching methods and strategy in teaching English for young learners. As a result, the students’ achievement does not work well. Thus, except to be successful in teaching English for young learners, it is ...

  1. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  2. ADULT LEARNERS IN DISTANCE HIGHER EDUCATION

    Directory of Open Access Journals (Sweden)

    NORICA-FELICIA BUCUR

    2012-05-01

    Full Text Available This paper attempts at identifying the main features that characterize distance higher education and adult education, respectively, in order to be able to establish to what extent adult learners can fit in distance higher education programs. The historical background of distance learning education, the factors that influence adult learners, and distance learning’s key objectives, effects, issues, advantages, and disadvantages are to be briefly investigated in order to reach the purpose of this paper. Recent developments in Information Technology have led to a new approach to teaching and learning, especially as far as adult learning and distance learning are concerned. Thus, this study will also focus on the consequences of using technology for course design, delivery, and the perception of adult learners participating in distance learning.

  3. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  4. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  5. Factors Influencing Learner Permit Duration

    Directory of Open Access Journals (Sweden)

    Johnathon P. Ehsani

    2016-12-01

    Full Text Available An increasing number of countries are requiring an extended learner permit prior to independent driving. The question of when drivers begin the learner permit period, and how long they hold the permit before advancing to independent licensure has received little research attention. Licensure timing is likely to be related to “push” and “pull” factors which may encourage or inhibit the process. To examine this question, we recruited a sample of 90 novice drivers (49 females and 41 males, average age of 15.6 years soon after they obtained a learner permit and instrumented their vehicles to collect a range of driving data. Participants completed a series of surveys at recruitment related to factors that may influence licensure timing. Two distinct findings emerged from the time-to-event analysis that tested these push and pull factors in relation to licensure timing. The first can be conceptualized as teens’ motivation to drive (push, reflected in a younger age when obtaining a learner permit and extensive pre-permit driving experience. The second finding was teens’ perceptions of their parents’ knowledge of their activities (pull; a proxy for a parents’ attentiveness to their teens’ lives. Teens who reported higher levels of their parents’ knowledge of their activities took longer to advance to independent driving. These findings suggest time-to-licensure may be related to teens’ internal motivation to drive, and the ability of parents to facilitate or impede early licensure.

  6. Impact of interactive online units on learning science among students with learning disabilities and English learners

    Science.gov (United States)

    Terrazas-Arellanes, Fatima E.; Gallard M., Alejandro J.; Strycker, Lisa A.; Walden, Emily D.

    2018-03-01

    The purpose of this study was to document the design, classroom implementation, and effectiveness of interactive online units to enhance science learning over 3 years among students with learning disabilities, English learners, and general education students. Results of a randomised controlled trial with 2,303 middle school students and 71 teachers across 13 schools in two states indicated that online units effectively deepened science knowledge across all three student groups. Comparing all treatment and control students on pretest-to-posttest improvement on standards-based content-specific assessments, there were statistically significant mean differences (17% improvement treatment vs. 6% control; p English learner status, indicating that these two groups performed similarly to their peers; students with learning disabilities had significantly lower assessment scores overall. Teachers and students were moderately satisfied with the units.

  7. Reading Test Performance of English-Language Learners Using an English Dictionary.

    Science.gov (United States)

    Albus, Debra; Thurlow, Martha; Liu, Kristin; Bielinski, John

    2005-01-01

    The authors examined the effects of a simplified English dictionary accommodation on the reading-test performance of Hmong English-language learners (ELLs). Participants included a control group of 69 non-ELL students and an experimental group of 133 Hmong ELLs from 3 urban middle schools in Minnesota. In a randomized counterbalanced design, all…

  8. Newest Web-Technologies for Studying and Diagnosing Individual Abilities of Learners

    Directory of Open Access Journals (Sweden)

    Yuliya S. Nikolaeva

    2017-09-01

    Full Text Available The relevance of the research is due to the need of taking into account the learners' cognitive characteristics in the educational process. Knowing the personal qualities of people is also important when choosing an occupation or employment. This is why the paper is aimed at describing the opportunities of the newest Web and mobile applications for studies and self-diagnostics of users based on the cloud technology of diagnosing the human individual and cognitive abilities. The leading approach to studying this problem is the projective and recursive strategy that allows viewing the problem of expert statistics accumulation and user diagnostic results analysis in an integrated way. The paper presents the developments in problem-solving computer environments for diagnosing human individual and integrated abilities. Grounds are given for diagnostics of the main human cognitive abilities: the scope of memory and attention; information processing, reading, typing speeds and others. The website for developing the new diagnostics and conducting studies can be accessed by everyone with any browser via http://self-test.ufoproger.ru. The website has been developed by the university students under the guidance of professor N.I. Pak. The materials of the paper are of practical value for teachers designing the educational process up to the learners' individual characteristics.

  9. How Do Novice and Expert Learners Represent, Understand, and Discuss Geologic Time?

    Science.gov (United States)

    Layow, Erica Amanda

    This dissertation examined the representations novice and expert learners constructed for the geologic timescale. Learners engaged in a three-part activity. The purpose was to compare novice learners' representations to those of expert learners. This provided insight into the similarities and differences between their strategies for event ordering, assigning values and scale to the geologic timescale model, as well as their language and practices to complete the model. With a qualitative approach to data analysis informed by an expert-novice theoretical framework grounded in phenomenography, learner responses comprised the data analyzed. These data highlighted learners' metacognitive thoughts that might not otherwise be shared through lectures or laboratory activities. Learners' responses were analyzed using a discourse framework that positioned learners as knowers. Novice and expert learners both excelled at ordering and discussing events before the Phanerozoic, but were challenged with events during the Phanerozoic. Novice learners had difficulty assigning values to events and establishing a scale for their models. Expert learners expressed difficulty with determining a scale because of the size of the model, yet eventually used anchor points and unitized the model to establish a scale. Despite challenges constructing their models, novice learners spoke confidently using claims and few hedging phrases indicating their confidence in statements made. Experts used more hedges than novices, however the hedging comments were made about more complex conceptions. Using both phenomenographic and discourse analysis approaches for analysis foregrounded learners' discussions of how they perceived geologic time and their ways of knowing and doing. This research is intended to enhance the geoscience community's understanding of the ways novice and expert learners think and discuss conceptions of geologic time, including the events and values of time, and the strategies used

  10. Free Open Access Medical Education (FOAM in Emergency Medicine: The Global Distribution of Users in 2016

    Directory of Open Access Journals (Sweden)

    Jennifer W. Bellows

    2018-04-01

    Full Text Available Introduction: Free open-access medical education (FOAM is a collection of interactive online medical education resources—free and accessible to students, physicians and other learners. This novel approach to medical education has the potential to reach learners across the globe; however, the extent of its global uptake is unknown. Methods: This descriptive report evaluates the 2016 web analytics data from a convenience sample of FOAM blogs and websites with a focus on emergency medicine (EM and critical care. The number of times a site was accessed, or “sessions”, was categorized by country of access, cross-referenced with World Bank data for population and income level, and then analyzed using simple descriptive statistics and geographic mapping. Results: We analyzed 12 FOAM blogs published from six countries, with a total reported volume of approximately 18.7 million sessions worldwide in 2016. High-income countries accounted for 73.7% of population-weighted FOAM blog and website sessions in 2016, while upper-middle income countries, lower-middle income countries and low-income countries accounted for 17.5%, 8.5% and 0.3%, respectively. Conclusion: FOAM, while largely used in high-income countries, is used in low- and middle-income countries as well. The potential to provide free, online training resources for EM in places where formal training is limited is significant and thus is prime for further investigation.

  11. Promising Instructional Practices for English Language Learners

    Science.gov (United States)

    Prince, Johanna

    2018-01-01

    Aim/Purpose: The purpose of this exploratory case study was to understand how teachers, working with English Language Learners (ELLs), expanded their knowledge and instructional practices as they implemented a one-to-one iPad® program. Background: English Language Learners experience linguistic, cultural, and cognitive shifts that can be…

  12. The Indonesian EFL Learners' Motivation in Reading

    Science.gov (United States)

    Salikin, Hairus; Bin-Tahir, Saidna Zulfiqar; Kusumaningputri, Reni; Yuliandari, Dian Puji

    2017-01-01

    The motivation will drive the EFL learners to be successful in reading. This study examined the Indonesian EFL learners' motivation in reading activity based on Deci and Ryans' theory of motivation including intrinsic and extrinsic. This study employed mixed-method design. The data obtained by distributing questionnaire and arranging the group…

  13. "Harry Potter" and the English Language Learner.

    Science.gov (United States)

    Coatney, Kathy

    2001-01-01

    Describes one teacher's success with using "Harry Potter" in a program to teach elementary school English language learners. Provides comprehension strategies incorporated to help learners understand the story. Highlights the importance of creating a classroom environment with a low level of anxiety, the implications of the program, and the value…

  14. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  15. Metacognitive Strategy Instruction as a Means to Improve Listening SelfEfficacy among Iranian Undergraduate Learners of English

    Directory of Open Access Journals (Sweden)

    Maryam Rahimirad

    2015-01-01

    Full Text Available Metacognitive strategy instruction (MetSI has been shown to have a strong impact on various aspects of English as a second/foreign language instruction. The present study aimed to investigate the effect of MetSI on the improvement of listening selfefficacy among English-as-a-foreign-language (EFL learners. A group of sixty female undergraduate learners of English literature at a state-run university in Iran consented to take part in this study. After homogenizing the participants' English proficiency level using a sample section of the British Council IELTS test, 40 learners were selected whose English proficiency fell within intermediate to upperintermediate level. A listening self-efficacy questionnaire (borrowed from Rahimi and Abedini, 2009 was used to measure the participants’ level of listening selfefficacy in the pre and post-test phases of the study. The participants were randomly assigned to treatment (n=20 and control (n=20 groups. The treatment group received 8 hours of MetSI during eight sessions based on the model proposed by Vandergrift (2003 while the control group didn't receive any explicit MetSI. The control group received the usual training in listening instead.

  16. Educating English Learners: What Every Classroom Teacher Needs to Know

    Science.gov (United States)

    Nutta, Joyce W.; Strebel, Carine; Mokhtari, Kouider; Mihai, Florin M.; Crevecoeur-Bryant, Edwidge

    2014-01-01

    In "Educating English Learners," Joyce W. Nutta and her colleagues offer practical tools for helping schools and teachers successfully integrate English learners into mainstream classrooms. Drawing on the One Plus model presented in their award-winning book, "Preparing Every Teacher to Reach English Learners," the authors now…

  17. An Investigation of Pronunciation Learning Strategies of Advanced EFL Learners

    Science.gov (United States)

    Hismanoglu, Murat

    2012-01-01

    This paper aims at investigating the kinds of strategies deployed by advanced EFL learners at English Language Teaching Department to learn or improve English pronunciation and revealing whether there are any significant differences between the strategies of successful pronunciation learners and those of unsuccessful pronunciation learners. After…

  18. The Evolving Military Learner Population: A Review of the Literature

    Science.gov (United States)

    Ford, Kate; Vignare, Karen

    2015-01-01

    This literature review examines the evolving online military learner population with emphasis on current generation military learners, who are most frequently Post-9/11 veterans. The review synthesizes recent scholarly and grey literature on military learner demographics and attributes, college experiences, and academic outcomes against a backdrop…

  19. The Impact of Self-Access Centres in Fostering Confidence, Motivation and Autonomy to Develop Language Skills

    Directory of Open Access Journals (Sweden)

    Asjad Ahmed Saeed Balla

    2017-07-01

    Full Text Available This Paper investigates the relation between studying in Self-Access centres and learners’ confidence, motivation and autonomous learning. The study based on three questions: (a To what extent autonomous learning motivates students/users of SAC? (b Is the use of SAC reinforcing students’ confidence? (c To what extent using SAC help in developing the students; learning skills? A questionnaire conducted to show learners; attitudes towards using SAC. The data was statistically analysed. The most important result revealed that the learners felt more confident and motivated after using SAC. Besides, there were a noticeable change in their language understanding and remarkable improvement in their language skills.

  20. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    .... The derivation of the author's thesis focuses awareness on effective information allocation that is reliable and accurate while maintaining its confidentiality based upon some level of discretionary access control (DAC...