Abstract-In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this purpose, SCORM (Sharable Contents Object Reference Model), IMS LD (Instructional Management System Learning Design) and other standards provide learning design support functions, such as, progress checks. However, in order to apply these types of standards, contents packaging is required, and due to the complicated standard dimensions, the facilitation level is lower than the work volume when developing the contents and this requires additional work when revision becomes necessary. In addition, since the learning results are managed by the server there is the problem of the OS being unable to save data when the network is cut off. In this study, a system is realized to manage the actions of learners through the event interception of a web-browser by using event hooking. Through this technique, all HTMLbased contents can be facilitated again without additional work and saving and analysis of learning results are available to improve the problems following the application of standards. Furthermore, the ubiquitous learning environment can be supported by tracking down learning results when the network is cut off.
Today, e-commerce transactions continue to impact the global business environment profoundly and its technologies and applications are beginning to focus more on mobile computing and the wireless web. As the usage of mobile devices becomes pervasive and convenient, the e-commerce through mobile devices is an emerging field. However, most of e-commerce systems do not only support privacy rights for user but also the rights for the merchant provider. A collection and processing of personal data may lead to private and family life violation, thus discouraging the public against the usage of new technologies. In this paper, we propose the enhanced-privacy m-commerce schemes, which are based on the e-commerce model using the GSM user authentication protocol.
This paper is devoted to design SecurityAPI that solves the disadvantages and restrictions due to several attack types of public key SecurityAPI and provides the security services. SecurityAPI may be applied to both domestic and foreign standard using domestic standard algorithm such as KCDSA and HAS-160 added to conventional PKCS #11. To verify the security of SecurityAPI for protecting key object based on public key, we provide the flow chart of each SecurityAPI function by graphical method using CPN and describe the process of SecurityAPI by sentence. Also, we analyze the CPN model of proposed Security API structure using the place invariant and verify the security of SecurityAPI that we do not need the modification for input data.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.