{"title":"Gamification in Educational Contexts: A Critical View on Mechanisms and Methodology","authors":"Stefan Piasecki","doi":"10.4018/IJAPUC.2019040104","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019040104","url":null,"abstract":"Gamification as a tool or procedure to add entertaining and motivating elements to usually non-entertaining environments such as schools or workplaces is becoming more and more popular. E-learning platforms like Moodle provide tools and sets of functions to add elements of gamification. An important factor, especially for education, is technology: individual achievements and progress can be recorded, measured, tracked and visualized and, therefore, identified and honored through bonus points, awards or rankings. This is where gamification can add some challenge and excitement to learning.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Deduplication Scheme for Cloud Encrypted Data","authors":"Vishal Passricha, Ashish Chopra, Shubhanshi Singhal","doi":"10.4018/IJAPUC.2019040103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019040103","url":null,"abstract":"Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplication process because encryption methods have varying characteristics. A convergent encryption (CE) scheme is widely used for secure data deduplication. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This article addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"555 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Coding and Discrimination (CODIS) Algorithm to Extract Features from Arabic Texts to Discriminate Arabic Poems","authors":"J. NadaAhmed, A. M. Rahma, M. Alrawi","doi":"10.4018/IJAPUC.2019010101","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019010101","url":null,"abstract":"This article proposes a new algorithm to discriminate Arabic poems by inserting Arabic poems texts and coding Arabic letters, extracting letters features depending on letter shapes to construct a multidimensional contingency table, and analyses the frequencies of letters in the inserted texts statistically. The proposed coding and discrimination (CODIS) algorithm could be applied for different Arabic texts in any media. A sample of five poems for six poets was examined to implement a CODIS algorithm. A Chi-Square statistic is used to determine the relation between the features and discriminate poems.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127617772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Brain Tumor in MRI Images, Using a Combination of Fuzzy C-Means and Thresholding","authors":"Y. Hamad, K. Simonov, Mohammad B. Naeem","doi":"10.4018/IJAPUC.2019010104","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019010104","url":null,"abstract":"The identification, segmentation, and detection of the infected area in brain tumor is a tedious and a time-consuming task. The different structures of the human body can be visualized by an image processing concept, an MRI. It is very difficult to visualize abnormal structures of the human brain using simple imaging techniques. An MRI technique contains many imaging modalities that scan and capture the internal structure of the human brain. This article concentrates on a noise removal technique, followed by improvement of medical images for a correct diagnosis using a balance contrast enhancement technique (BCET). Then, image segmentation is used. Finally, the Canny edge detection method is applied to detect the fine edges. The experiment results achieved nearly 98% accuracy in detecting the area of the tumor and normal brain regions in MRI images demonstrating the effectiveness of the proposed technique.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133852111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast Tumor Detection Via Fuzzy Morphological Operations","authors":"Mohammed Y. Kamil, A. Salih","doi":"10.4018/IJAPUC.2019010103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019010103","url":null,"abstract":"Breast cancer is one of most dangerous diseases and more common in women. The early detection of cancer is one of the most key factors for possible cure. There are numerous methods of diagnosis amongst which: clinical examination, sonar and mammography, which is the best and more effective in detecting breast cancer. Detection of breast tumors is difficult because of the weak illumination in the image and the overlap between regions. Segmentation is one the crucial steps in locating the tumors, which is an important method of diagnosis of the computer. In this study, segmentation techniques are proposed based on; classic morphology and fuzzy morphology, and a comparison between them. The proposed methods were tested using the database of mini -MIAS, which contains 322 images. After the comparison the statistical results, it shows, the detection of tumor boundary with fuzzy morphology give the higher accuracy than the results in classic morphology. The accuracy is 60.69%, 58.61% respectively due to the high flexibility of foggy logic in dealing with the low lighting in the medical images.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infant Cry Recognition System: A Comparison of System Performance based on CDHMM and ANN","authors":"Yosra Mohammed","doi":"10.4018/IJAPUC.2019010102","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019010102","url":null,"abstract":"Cries of infants can be seen as an indicator of pain. It has been proven that crying caused by pain, hunger, fear, stress, etc., show different cry patterns. The work presented here introduces a comparative study between the performance of two different classification techniques implemented in an automatic classification system for identifying two types of infants' cries, pain, and non-pain. The techniques are namely, Continuous Hidden Markov Models (CHMM) and Artificial Neural Networks (ANN). Two different sets of acoustic features were extracted from the cry samples, those are MFCC and LPCC, the feature vectors generated by each were eventually fed into the classification module for the purpose of training and testing. The results of this work showed that the system based on CDHMM have better performance than that based on ANN. CDHMM gives the best identification rate at 96.1%, which is much higher than 79% of ANN whereby in general the system based on MFCC features performed better than the one that utilizes LPCC features.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing Access, Social Inclusion, and Quality Through Mobile Learning","authors":"Ebba S. I. Ossiannilsson","doi":"10.4018/IJAPUC.2018100103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2018100103","url":null,"abstract":"Mobile learning is part of a new learning landscape created by the availability of technologies and increasing digitization. As the use of mobile technology has increased worldwide, interest has grown in its potential for supporting flexible, accessible, and personalized education. As a result, higher education is facing a variety of challenges both now and in the coming decade (2020–2030) because of the continuing advances in technological development and digitization. Daily life, school, and work have become mobile. Moreover, the digitalized society fosters digital citizenship. Students entering higher education today have grown up using the internet and mobile devices. Universities need to offer a mix of face-to-face and online learning possibilities, such as open educational resources (OER) and massive open online courses (MOOC), which allow individuals to access education anywhere, anytime, and through any device. This article focuses on mobile learning (m-learning) in open learning educational contexts and quality enhancement in mobile learning in higher education. The article starts by defining mobile learning and the usefulness of m-learning in education, followed by some examples of mobile devices and a discussion of the principles of mobile learning. Examples of mobile learning design are then presented. Next, the advantages and uses of mobile learning in education are discussed. Because the issue of quality in e-learning and mobile learning is complex, this article focuses on course design, learning design, media design, and content. Additional dimensions of quality are security, accessibility, interactivity, flexibility, personalization, mobile devices, and their interfaces. Moreover, concepts such as personal learning and social innovation in relation to mobile learning are discussed. In the concluding section, future challenges are discussed.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"At Sensor Diagnosis for Smart Healthcare: Probability or Conditional Probability Based Approach vs. k-Nearest Neighbour","authors":"Chetna Laroiya, V. B. Aggarwal","doi":"10.4018/IJAPUC.2018100101","DOIUrl":"https://doi.org/10.4018/IJAPUC.2018100101","url":null,"abstract":"In order to implement IoT-based health-care for improved quality of life, we have to deal with sensor and communication technologies. In this article, the authors propose an approach to analyse real-time data streaming from a patient's surface body sensors, which are to be looked upon in a small sliding window frame. Time series analysis of data from the sensors is effective in reducing the round-trip delay between patient and the medical server. Two algorithms are for the sensor, and odd measures are proposed based on joint probability and joint conditional probability. The proposed algorithms are to be SQL compliant, as traces of at-sensor UDBMS alongside elementary capabilities supports databases with a meagre amount of SQL, which is evident in the literature.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Spread Spectrum Based Approach for Ensuring Energy Efficiency and Security in Wireless Sensor Networks","authors":"Nejla Rouissi, H. Gharsellaoui, Sadok Bouamama","doi":"10.4018/IJAPUC.2018100104","DOIUrl":"https://doi.org/10.4018/IJAPUC.2018100104","url":null,"abstract":"Wireless sensor networks (WSNs) play a central role in the Internet of Things (IoT). It consists of small-size sensor nodes connected to the internet through gateways providing content rich information. So, the traffic transmission between sensor nodes over radio links requires highly bandwidth and needs to ensure the reliability of the data. Therefore, providing safe communications of sensor data over wireless communication channel plays an essential role. Thus, the important issue on wireless sensor networks is to find an optimal schema that ensuring energy efficiency together with the security. In contrast, implementing traditional cryptographic algorithms is not very well suited for WSNs nodes. In this article, a novel combination of spread spectrum into watermarking scheme is presented. This watermarking schema based on direct-frequency-time spread spectrum secures data communication against jamming and falsification to ensure data integrity and increases resistance to interference at the same time ensures the energy efficiency.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Context-Driven Commit Protocol for Enhancing Transactional Services Performance in Pervasive Environments","authors":"Widad Ettazi, H. Hafiddi, M. Nassar","doi":"10.4018/IJAPUC.2018100102","DOIUrl":"https://doi.org/10.4018/IJAPUC.2018100102","url":null,"abstract":"The proposed techniques for wireless environments during the last decade have limited support for dynamically changing environments. Due to its nature, the mobile computing environment is extremely dynamic and subject to rapid and unpredictable changes. Similarly, the characteristics of mobile applications affect their transactional requirements. The challenge is to reflect on solutions offering more flexibility and adaptability. In this article, the contribution was focused mainly on the problem of atomic commit that ensures the atomicity property. The trail of adapting mobile transaction commit protocols to context changes has been explored. This has led to the formalization of a flexible transaction model CATSM that supports adaptable properties and a commit protocol CA-TCP that enables adaptation to application requirements and mobile context in terms of transactional properties and execution cost. An architecture based on the concept of adaptation policy has also been designed for the implementation of the proposed solution.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116720439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}