Accessibility and Preferred Use of Online Web Applications Among WIC Participants With Internet Access

2014 ◽  
Vol 46 (3) ◽  
pp. S87-S92 ◽  
Author(s):  
Robert J. Bensley ◽  
Amanda Hovis ◽  
Karissa D. Horton ◽  
Jennifer J. Loyo ◽  
Kara M. Bensley ◽  
...  
Author(s):  
Chris Campbell ◽  
Heidi Blair

This chapter, by highlighting research project examples, reports on methods of active learning to promote student engagement in previously static classes. Through these examples, one can explore how increased lecture interactivity can be accomplished via the implementation of strategies sans technology and those that leverage the often ubiquitous wireless Internet accessed by mobile devices found in higher education learning spaces today. A variety of practices for engaging students in lectures are described including those that promote student voice through various emerging technologies. Technologies discussed include learner response systems, 3D simulations, videos, online web applications such as Padlet and tlk.io, as well as various other feedback systems. Learning design theory is used to relate the case studies included to the latest theory.


Author(s):  
Akhilesh Bajaj ◽  
Ramayya Krishnan

With the ubiquitous availability of browsers and internet access, the last few years have seen a tremendous growth in the number of applications being developed on the world wide web (WWW). Models for analyzing and designing these applications are only just beginning to emerge. In this work, we propose a 3-dimensional classification space for WWW applications, consisting of a degree of structure of pages dimension, a degree of support for interrelated events dimension and a location of processing dimension. Next, we propose usability design metrics for WWW applications along the structure of pages dimension. To measure these ,we propose CMU-WEB: a conceptual model that can be used to design WWW applications, such that its schemas provide values for the design metrics. This work represents the first effort, to the best of our knowledge, to provide a conceptual model that measures quantifiable metrics that can be used for the design of more usable web applications, and that can also be used to compare the usability of existing web applications, without empirical testing.


Author(s):  
Akhilesh Bajaj ◽  
Ramayya Krishnan

With the ubiquitous availability of browsers and Internet access, the last few years have seen a tremendous growth in the number of applications being developed on the World Wide Web (WWW). Models for analyzing and designing these applications are only just beginning to emerge. In this work, we propose a three-dimensional classification space for WWW applications, consisting of a degree of structure of pages dimension, a degree of support for interrelated events dimension, and a location of processing dimension. Next, we propose usability design metrics for WWW applications along the structure of pages dimension. To measure these, we propose CMU-WEB–a conceptual model that can be used to design WWW applications, such that its schema provide values for the design metrics. This work represents the first effort, to the best of our knowledge, to provide a conceptual model that measures quantifiable metrics that can be used for the design of more usable Web applications, and that can also be used to compare the usability of existing Web applications, without empirical testing.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 10378-10391
Author(s):  
Santiago Ibarra-Fiallos ◽  
Javier Bermejo Higuera ◽  
Monserrate Intriago-Pazmino ◽  
Juan Ramon Bermejo Higuera ◽  
Juan Antonio Sicilia Montalvo ◽  
...  

2021 ◽  
Author(s):  
Bert Veenendaal ◽  
Maria Antonia Brovelli ◽  
Songnian Li

Web mapping and the use of geospatial information online have evolved rapidly over the past few decades. Almost everyone in the world uses mapping information, whether or not one realizes it. Almost every mobile phone now has location services and every event and object on the earth has a location. The use of this geospatial location data has expanded rapidly, thanks to the development of the Internet. Huge volumes of geospatial data are available and daily being captured online, and are used in web applications and maps for viewing, analysis, modeling and simulation. This paper reviews the developments of web mapping from the first static online map images to the current highly interactive, multi-sourced web mapping services that have been increasingly moved to cloud computing platforms. The whole environment of web mapping captures the integration and interaction between three components found online, namely, geospatial information, people and functionality. In this paper, the trends and interactions among these components are identified and reviewed in relation to the technology developments. The review then concludes by exploring some of the opportunities and directions. Keywords: web mapping; Web GIS; Internet; online; web services; digital earth; GeoWeb; semantic web; collaborative; development era


2019 ◽  
Vol 20 (4) ◽  
pp. 669-685
Author(s):  
A. Dhanapal ◽  
P. Nithyanandam

Cloud computing is the latest buzzword and cutting-edge technology. The cost-efficiency, easy to operate, on-demand services, availability, makes the cloud so popular. The online web applications based on the internet such as E-Healthcare, E-Commerce are moving to the cloud to reduce the operating investment cost. These applications are vulnerable to slow HTTP Distributed Denial of Service (DDoS) attack in the cloud. This kind of attacks aims to consume the resources of the application as well as the hosting system so that to bring down the services. The various forms of the slow HTTP DDoS are HTTP header attack, HTTP body attack and HTTP read attack. Due to the nature of mimicking the slow network behaviour, this attack is very challenging to detect. This is even more difficult to identify in the cloud environment as it has multiple attack paths. Theweb applications running in the cloud should have been safeguarded from the slow HTTP DDoS attacks. This paper proposed a novel multi-stage zone-based classification model to identify, mitigate and prevent the slow HTTP DDoS attacks in the cloud environment. The solution is implemented using the OpenStack cloud environment. The open-source slowHTTPTest tool is used to generate different types of slow HTTP DDoS attacks.


Healthcare ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 466
Author(s):  
Hamid Mukhtar ◽  
Hafiz Ahmad ◽  
Muhammad Khan ◽  
Nasim Ullah

The multidisciplinary nature of the work required for research in the COVID-19 pandemic has created new challenges for health professionals in the battle against the virus. They need to be equipped with novel tools, applications, and resources—that have emerged during the pandemic—to gain access to breakthrough findings; know the latest developments; and to address their specific needs for rapid data acquisition, analysis, evaluation, and reporting. Because of the complex nature of the virus, healthcare systems worldwide are severely impacted as the treatment and the vaccine for COVID-19 disease are not yet discovered. This leads to frequent changes in regulations and policies by governments and international organizations. Our analysis suggests that given the abundance of information sources, finding the most suitable application for analysis, evaluation, or reporting, is one of such challenges. However, health professionals and policy-makers need access to the most relevant, reliable, trusted, and latest information and applications that can be used in their day-to-day tasks of COVID-19 research and analysis. In this article, we present our analysis of various novel and important web-based applications that have been specifically developed during the COVID-19 pandemic and that can be used by the health professionals community to help in advancing their analysis and research. These applications comprise search portals and their associated information repositories for literature and clinical trials, data sources, tracking dashboards, and forecasting models. We present a list of the minimally essential online, web-based applications to serve a multitude of purposes, from hundreds of those developed since the beginning of the pandemic. A critical analysis is provided for the selected applications based on 17 features that can be useful for researchers and analysts for their evaluations. These features make up our evaluation framework and have not been used previously for analysis and evaluation. Therefore, knowledge of these applications will not only increase productivity but will also allow us to explore new dimensions for using existing applications with more control, better management, and greater outcome of their research. In addition, the features used in our framework can be applied for future evaluations of similar applications and health professionals can adapt them for evaluation of other applications not covered in this analysis.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Muhammad Bilal ◽  
Muhammad Asif ◽  
Abid Bashir

It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session hijacking situation because in other existing OpenID communication methods such double factor authentication has more chances of valid user session hijacked. The proposed communication protocol secures the OpenID URL with the help of additional innovative parameters such as Special Alphanumeric String (SAS) and Special Security PIN (SSP). The anticipated triple authentication protocol authenticated client unique OpenID URL at OpenID Provider (OP) side once and SAS and SSP field at Relying Party (RP) side. The anticipated protocol provides unique Single-Sign-On (SSO) services to OpenID users. The experimental website is tested by experts of web developers for avoiding session hijacking situation in the presence of hackers. The findings demonstrated that Dense Authentication Authorization and Accounting (DAAA) protocol minimizes the risk of a session hijacking in OpenID communication environment.


2018 ◽  
Vol 7 (2.2) ◽  
pp. 45 ◽  
Author(s):  
Fatin Azura Ahmad Fauzy ◽  
Zuraini Ali Shah ◽  
Rd Rohmat Saedudin ◽  
Shahreen Kasim ◽  
Ayu Alyani Azadin ◽  
...  

UTM Games is an annual sports tournament organized by UTM Sports Excellence involving students, staff team, PELUAS (International Student Team) and International Campus Kuala Lumpur. There are 14 types of contested games such as volleyball, soccer, squash, netball, bowling, badminton, kayaking, futsal, sepak takraw, table tennis, tennis, basketball, cycling, and lawn bowls. Currently registration and review of result for UTM Games are still done manually and on papers for some of the residential colleges. While for some other residential colleges, registration and review of results are done by web applications such as in Tun Ghafar Baba College (KTGB). Therefore, the Registration and Review of Results for UTM Games using Smart Phone is developed because most users nowadays have a smartphone and internet access. In addition, the system allows the user to see the results of UTM Games without having to log into social sites such as Facebook. The system is developed using ASP.Net technology and Microsoft Visual Studio 2010. The methodology used in developing this system is a prototype evolving methodology. This methodology allows the user to provide feedback and insights to add dynamically. The prototype will be modified according to the views and feedback given. The system is a platform to make it easier for managers to register for the game. In addition, the system is developed to enable students to review results from UTM Games more quickly and accurately.  


2020 ◽  
Vol 2 (3) ◽  
pp. 175-181
Author(s):  
Vivekanadam B

Activity monitoring in online group meetings has become a needed application in the COVID-19 situation. During the lockdown period, most of the teaching classes were conducted through online web applications. The number of attendees in such classes are very higher and it is not to be manageable by a single tutor of the class. The applications are also designed to show only several number of person’s faces in a particular window. To improve the quality of such online classes, it is mandatory to verify the listener’s activity. The paper evaluates certain artificial intelligence based deep learning techniques for finding a suitable approach for monitoring the listener’s activity in real time.


Sign in / Sign up

Export Citation Format

Share Document