This document discusses the use of open source technology in institutions of learning in Kenya. It finds that students and teaching staff widely use open source software and tools in learning and teaching due to factors like ease of access, lack of vendor dependency, and enhancement of the learning process. Open source allows students to access source codes and modify software, supporting the learning of software development skills. Institutions also benefit from the flexibility and cost-effectiveness of open source. The study concludes that open source has become an important part of learning and operations in Kenyan educational institutions.
Collaborative filtering content for parental control in mobile application ch...journalBEEI
Mobile phone is an important medium of communication for most people regardless their age. One of the most used mobile phone application is chat application. Since mobile users are across different age groups, from youngsters to senior citizen, each age level has their own ways or styles of communication when using mobile application chatting. Adult mostly used proper syntax with complete sentences while youngsters normally use short forms with incomplete sentences. In addition, improper communication styles, usage of bad and inappropriate words has become a trend among youngsters. This matter gives negative impact on the education system in a short-term and national language preservation in a long term. Hence, in this paper, researchers present a tool that provides word recommendations for mobile application chatting. This tool would be is an education material to younger generation users with subtle approach. Implementation of the tool is by adapting Collaborative Filtering approach with User-Based model which focusing on recommendation on similar interest between users. Collaborative filtering content tool is functioning well during the functionality testing and it is thriving as a mobile application chatting guidance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technological development have altered the way we communicate, learn, think, share, and spread information. Mobile technologies are those that make use of wireless technologies to gain some sort of data. As mobile connectedness continues to spread across the world, the value of employing mobile technologies in the arena of learning and teaching seems to be both self-evident and unavoidable The fast deployment of mobile devices and wireless networks in university campuses makes higher education a good environment to integrate learners-centered m-learning. This paper discusses mobile learning technologies that are being used for educational purposes and the effect they have on teaching and learning methods.
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
Technological development have altered the way we communicate, learn, think, share, and spread information. Mobile technologies are those that make use of wireless technologies to gain some sort of data. As mobile connectedness continues to spread across the world, the value of employing mobile technologies in the arena of learning and teaching seems to be both self-evident and unavoidable The fast deployment of mobile devices and wireless networks in university campuses makes higher education a good environment to integrate learners-centered m-learning . this paper discusses mobile learning technologies that are being used for educational purposes and the effect they have on teaching and learning methods.
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
Due to the truth that traditional centralized trusting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P network into numerous overlapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the evaluations among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. In P2P community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participants in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious peers and it has fewer errors in desires searching. It additionally costs little charge inside the re-convergence technique whilst community topology changes.
Establishment of Educational Network among the Undergraduate with Mobile Appl...Cahit Berkay Kazangirler
Abstract— It is easier and faster for students to learn from knowledgeable students. The speed of information age and evolving educational technology have changed the way of teaching and the level of knowledge acquired during teaching. In this study, we present establishment of educational network among the undergraduate with mobile application. Students will be trained on the mobile application using smart devices which are present in almost every university student today. For this training, firstly the teams will be established and the target group will be reached for the education given by the knowledgeable student. With the mobile application to be prepared, students will be able to enroll in courses that are opened, will be notified about the lessons from the instructors and will be able to access the necessary source documents easily. The application will also be a website at the same time and all the operations performed in the application will also be available on the website.
Collaborative filtering content for parental control in mobile application ch...journalBEEI
Mobile phone is an important medium of communication for most people regardless their age. One of the most used mobile phone application is chat application. Since mobile users are across different age groups, from youngsters to senior citizen, each age level has their own ways or styles of communication when using mobile application chatting. Adult mostly used proper syntax with complete sentences while youngsters normally use short forms with incomplete sentences. In addition, improper communication styles, usage of bad and inappropriate words has become a trend among youngsters. This matter gives negative impact on the education system in a short-term and national language preservation in a long term. Hence, in this paper, researchers present a tool that provides word recommendations for mobile application chatting. This tool would be is an education material to younger generation users with subtle approach. Implementation of the tool is by adapting Collaborative Filtering approach with User-Based model which focusing on recommendation on similar interest between users. Collaborative filtering content tool is functioning well during the functionality testing and it is thriving as a mobile application chatting guidance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technological development have altered the way we communicate, learn, think, share, and spread information. Mobile technologies are those that make use of wireless technologies to gain some sort of data. As mobile connectedness continues to spread across the world, the value of employing mobile technologies in the arena of learning and teaching seems to be both self-evident and unavoidable The fast deployment of mobile devices and wireless networks in university campuses makes higher education a good environment to integrate learners-centered m-learning. This paper discusses mobile learning technologies that are being used for educational purposes and the effect they have on teaching and learning methods.
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
Technological development have altered the way we communicate, learn, think, share, and spread information. Mobile technologies are those that make use of wireless technologies to gain some sort of data. As mobile connectedness continues to spread across the world, the value of employing mobile technologies in the arena of learning and teaching seems to be both self-evident and unavoidable The fast deployment of mobile devices and wireless networks in university campuses makes higher education a good environment to integrate learners-centered m-learning . this paper discusses mobile learning technologies that are being used for educational purposes and the effect they have on teaching and learning methods.
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
Due to the truth that traditional centralized trusting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P network into numerous overlapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the evaluations among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. In P2P community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participants in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious peers and it has fewer errors in desires searching. It additionally costs little charge inside the re-convergence technique whilst community topology changes.
Establishment of Educational Network among the Undergraduate with Mobile Appl...Cahit Berkay Kazangirler
Abstract— It is easier and faster for students to learn from knowledgeable students. The speed of information age and evolving educational technology have changed the way of teaching and the level of knowledge acquired during teaching. In this study, we present establishment of educational network among the undergraduate with mobile application. Students will be trained on the mobile application using smart devices which are present in almost every university student today. For this training, firstly the teams will be established and the target group will be reached for the education given by the knowledgeable student. With the mobile application to be prepared, students will be able to enroll in courses that are opened, will be notified about the lessons from the instructors and will be able to access the necessary source documents easily. The application will also be a website at the same time and all the operations performed in the application will also be available on the website.
An approach to designing and developing an LMS framework appropriate for youn...IJECEIAES
The new people generation Z can be viewed in terms of software engineering as specific users who have high requirements regarding the functions and interface of the software applications, connectivity to social networks and instant communication via the Internet. In recent years, the number of electronic learning systems increased, but students are still not motivated to learn. This requires developing new conceptual models of training and learning software, tailored to the skills and preferences of the end-users. The young students: from kindergartens to preschools and primary schools are special users who have not been studied exhaustively. To present the problem related to the development of learning and training software thoroughly, the most commonly used standards and current trends, as well as the advantages and disadvantages of LMS platforms have been reviewed. The commonly used software design and development technologies have been discussed. We proposed a strategy for developing a web-based e-learning management system according to the possibilities of young pupils as a specific user. We described a software architecture, based on SCORM's specification, and we developed an LMS prototype. The basic methodology used in the design and creation of the system we propose is user-centered design.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Digital landscapes: inclusive potential versus exclusive practice. Sue Watling
Digital landscapes: inclusive potential versus exclusive practice. International Journal of Diversity in Organizations, Communities and Nations, 11 (5). pp. 109-116. ISSN 1447-9532
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Presentation made May 13, 2010 by Rob Peregoodoff (Manager, Learning Technologies Sauder School of Business) on behalf of the University of British Columbia TAB/OLT office.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
Empowerment Technologies, ET, Live C. Angga, Malungon NHS, Empowerment Technology, Senior High School, SHS, Department of Education, SHS, ET Student LM, Learning Materials for ET students
Cloud Computing and Content Management Systems : A Case Study in Macedonian E...neirew J
Technologies have become inseparable of our lives, economy, and the society as a whole. For example,
clouds provide numerous computing resources that can facilitate our lives, whereas the Content
Management Systems (CMSs) can provide the right content for the right user. Thus, education must
embrace these emerging technologies in order to prepare citizens for the 21st century. The research
explored ‘if’ and ‘how’ Cloud Computing influences the application of CMSs, and ‘if’ and ‘how’ it fosters
the usage of mobile technologies to access cloud resources. The analyses revealed that some of the
respondents have sound experience in using clouds and in using CMSs. Nevertheless, it was evident that
significant number of respondents have limited or no experience in cloud computing concepts, cloud
security and CMSs, as well. Institutions of the system should update educational policies in order to enable
education innovation, provide means and support, and continuously update/upgrade educational
infrastructure.
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
The mobile phone has received global attention primarily as a personal consumer technology. However, we believe that mobile information technology in general will play a significant role in organisational efforts to innovate current practices and have significant economic impact. Enterprise mobility signals new ways of managing how people work together using mobile information technology and will form an integral part of the efforts to improve the efficiency and effectiveness of information work. This belief is, however, not reflected in the current selection of books and collections exploring the issue of enterprise mobility. The aim of this paper is to highlight some of the key challenges in the application of mobile information technology to improve organisational efficiency. This is accomplished through comparing and contrasting findings from a selection of 11 empirical studies of enterprise mobility with information technology conducted between 2001 and 2007. The paper argues that the debate so far has largely failed to embed glowing accounts for technological potential in a sound discussion of organisational realities. In particular, there has been a lack of balanced accounts of the implicit and explicit trade-offs involved in mobilising the interaction between members of the workforce.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
Unlock innovation with open source! Collaborate globally, harness community power. Discover the future of tech. Dive in now!
In the dynamic landscape of technology, innovation is the lifeblood of progress. One of the most significant phenomena driving innovation today is open source software (OSS). This article explores the intricacies of open source collaboration and its pivotal role in fostering innovation in the tech industry.
An approach to designing and developing an LMS framework appropriate for youn...IJECEIAES
The new people generation Z can be viewed in terms of software engineering as specific users who have high requirements regarding the functions and interface of the software applications, connectivity to social networks and instant communication via the Internet. In recent years, the number of electronic learning systems increased, but students are still not motivated to learn. This requires developing new conceptual models of training and learning software, tailored to the skills and preferences of the end-users. The young students: from kindergartens to preschools and primary schools are special users who have not been studied exhaustively. To present the problem related to the development of learning and training software thoroughly, the most commonly used standards and current trends, as well as the advantages and disadvantages of LMS platforms have been reviewed. The commonly used software design and development technologies have been discussed. We proposed a strategy for developing a web-based e-learning management system according to the possibilities of young pupils as a specific user. We described a software architecture, based on SCORM's specification, and we developed an LMS prototype. The basic methodology used in the design and creation of the system we propose is user-centered design.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Digital landscapes: inclusive potential versus exclusive practice. Sue Watling
Digital landscapes: inclusive potential versus exclusive practice. International Journal of Diversity in Organizations, Communities and Nations, 11 (5). pp. 109-116. ISSN 1447-9532
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Presentation made May 13, 2010 by Rob Peregoodoff (Manager, Learning Technologies Sauder School of Business) on behalf of the University of British Columbia TAB/OLT office.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
Empowerment Technologies, ET, Live C. Angga, Malungon NHS, Empowerment Technology, Senior High School, SHS, Department of Education, SHS, ET Student LM, Learning Materials for ET students
Cloud Computing and Content Management Systems : A Case Study in Macedonian E...neirew J
Technologies have become inseparable of our lives, economy, and the society as a whole. For example,
clouds provide numerous computing resources that can facilitate our lives, whereas the Content
Management Systems (CMSs) can provide the right content for the right user. Thus, education must
embrace these emerging technologies in order to prepare citizens for the 21st century. The research
explored ‘if’ and ‘how’ Cloud Computing influences the application of CMSs, and ‘if’ and ‘how’ it fosters
the usage of mobile technologies to access cloud resources. The analyses revealed that some of the
respondents have sound experience in using clouds and in using CMSs. Nevertheless, it was evident that
significant number of respondents have limited or no experience in cloud computing concepts, cloud
security and CMSs, as well. Institutions of the system should update educational policies in order to enable
education innovation, provide means and support, and continuously update/upgrade educational
infrastructure.
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
The mobile phone has received global attention primarily as a personal consumer technology. However, we believe that mobile information technology in general will play a significant role in organisational efforts to innovate current practices and have significant economic impact. Enterprise mobility signals new ways of managing how people work together using mobile information technology and will form an integral part of the efforts to improve the efficiency and effectiveness of information work. This belief is, however, not reflected in the current selection of books and collections exploring the issue of enterprise mobility. The aim of this paper is to highlight some of the key challenges in the application of mobile information technology to improve organisational efficiency. This is accomplished through comparing and contrasting findings from a selection of 11 empirical studies of enterprise mobility with information technology conducted between 2001 and 2007. The paper argues that the debate so far has largely failed to embed glowing accounts for technological potential in a sound discussion of organisational realities. In particular, there has been a lack of balanced accounts of the implicit and explicit trade-offs involved in mobilising the interaction between members of the workforce.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
Unlock innovation with open source! Collaborate globally, harness community power. Discover the future of tech. Dive in now!
In the dynamic landscape of technology, innovation is the lifeblood of progress. One of the most significant phenomena driving innovation today is open source software (OSS). This article explores the intricacies of open source collaboration and its pivotal role in fostering innovation in the tech industry.
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)Paul Dravis
Open Source Software: Perspectives for Development addresses 1) the opportunities and challenges from the dramatic growth of open source software, 2) how developing country policy makers and other key stakeholders make informed decisions and 3) the benefits, costs and implications of choosing open source solutions.
Understanding Continuous Design in F/OSS ProjectsBetsey Merkel
By authors Les Gasser1,2
gasser@uiuc.edu
Gabriel Ripoche1, 3
gripoche@uiuc.edu
Walt Scacchi2
wscacchi@ics.uci.edu
Bryan Penne1
bpenne@uiuc.edu
Abstract
Open Source Software (OSS) is in regular widespread use supporting critical
applications and infrastructure, including the Internet and World Wide Web themselves. The communities of OSS users and developers are often interwoven. The deep engagement of users and developers, coupled with the openness of systems lead to community-based system design and re-design activities that are continuous. Continuous redesign is facilitated by communication and knowledge-
sharing infrastructures such as persistent chat rooms, newsgroups, issue-
reporting/tracking repositories, sharable design representations and many kinds of
"software informalisms." These tools are arenas for managing the extensive, varied,
multimedia community knowledge that forms the foundation and the substance of
system requirements. Active community-based design processes and knowledge repositories create new ways of learning about, representing, and defining systems that challenge current models of representation and design. This paper presents several aspects of our research into continuous, open, community-based design
practices. We discuss several new insights into how communities represent
knowledge and capture requirements that derive from our qualitative empirical
studies of large (ca. 2GB+) repositories of problem-report data, primarily from the
Mozilla project.
All Things Open 2023
Presented at All Things Open 2023
Presented by Deb Bryant - Open Source Initiative, Patrick Masson - Apereo Foundation, Stephen Jacobs - Rochester Institute of Technology, Ruth Suehle - SAS, & Greg Wallace - FreeBSD Foundation
Title: Open Source and Public Policy
Abstract: New regulations in the software industry and adjacent areas such as AI, open science, open data, and open education are on the rise around the world. Cyber Security, societal impact of AI, data and privacy are paramount issues for legislators globally. At the same time, the COVID-19 pandemic drove collaborative development to unprecedented levels and took Open Source software, open research, open content and data from mainstream to main stage, creating tension between public benefit and citizen safety and security as legislators struggle to find a balance between open collaboration and protecting citizens.
Historically, the open source software community and foundations supporting its work have not engaged in policy discussions. Moving forward, thoughtful development of these important public policies whilst not harming our complex ecosystems requires an understanding of how our ecosystem operates. Ensuring stakeholders without historic benefit of representation in those discussions becomes paramount to that end.
Please join our open discussion with open policy stakeholders working constructively on current open policy topics. Our panelists will provide a view into how oss foundations and other open domain allies are now rising to this new challenge as well as seizing the opportunity to influence positive changes to the public’s benefit.
Topics: Public Policy, Open Science, Open Education, current legislation in the US and EU, US interest in OSS sustainability, intro to the Open Policy Alliance
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2023 conference: https://2023.allthingsopen.org/
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
OPEN SOURCE TECHNOLOGY: AN EMERGING AND VITAL PARADIGM IN INSTITUTIONS OF LEARNING IN KENYA
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
DOI: 10.5121/ijcsit.2018.10505 50
OPEN SOURCE TECHNOLOGY: AN EMERGING AND
VITAL PARADIGM IN INSTITUTIONS OF LEARNING
IN KENYA
Cosmas Kabii Muthamia1
, Gregory Wanyembi2
, Nahason Matoke3
1
Directorate of ICT Services,Maseno University, kenya
2
School of Information and Knowledge Management, University of Kabianga
3
Department of Computer Science, Masinde Muliro University of Science and
Technology, Kenya
ABSTRACT
Open Source Software is the major rival in the software market previously dominated by proprietary
software products. Open Source Software(OSS) is available in various forms including web servers,
Enterprise Resource Planning systems (ERPs), Academic management systems and network management
systems and the development and uptake of such software by both commercial and non-commercial
companies and institutions is still on the rise. The availability of OSS applications for every common type
of enterprise, minimal licensing issues and availability of source code as well as ease of access has made
the technology even more attractive in learning and teaching of software based courses in institutions of
learning. Through embracing this technology, institutions of learning have been able to minimize general
operations cost that could have otherwise been incurred in procuring similar proprietary software.
Students and teaching staff can nowadays interact and modify the readily available source code hence
making learning and teaching more practical.
KEYWORDS
Information and Communication Technology(ICT),Apache Internet Information Server (IIS), MYSQL,
Open Source Software (OSS), Open Source Technology, Return on Investment (ROI).
1. INTRODUCTION
According to [16] open source development is an approach to software development in which the
source code of a software system is published and volunteers are invited to participate in its
development process. Its roots are in the Free Software Foundation (www.fsf.org), which
advocates that source code should not be proprietary but rather should always be available for
users to examine and modify as they wish. Open source software extended this idea by using the
Internet to recruit a much larger population of volunteer developers. Many of them are also users
of the code. As a result, more and more product companies are using an open source approach to
development. Their business model is not reliant on selling a software product per se but on
selling support for that product as they believe that involving the open source community will
allow software to be developed more cheaply, more quickly and will create a community of users
for the software.
Thus, the term open source software can be well described by first understanding the meaning of
the term open source as a technology or culture It is usually understood differently by different
people depending on the context. According to[1], the term open source software refers to
software comes with licenses that provide existing and future users the right to use, inspect,
modify, and distribute (modified and unmodified) versions of the software to others. He further
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
51
emphasizes that it is not only the concept of providing “free” access to the software and its
source code that makes open source software the phenomenon that it is, but also the development
culture. On the other hand,[2] defines open source as a software development method that makes
source code available to a large community that participates in development by following flexible
processes and communicating via the Internet. For the purpose of this study, open source software
was considered as any software whose source code is published and made available to the public,
enabling anyone to copy, modify and redistribute the source code without paying royalties or
fees. This is not to be confused with software which is available to the end user at no cost, which
is known as freeware whose source is not available for editing and redistribution. However, free
software may be distributed with or without charge. Open source code evolves through
community cooperation. These communities are composed of individual programmers as well as
very large software houses.
In a world where Microsoft Corporation increasingly threatens to dominate computing and the
Internet, the strongest potential rival to its dominance is no longer its traditional commercial
rivals but Open Source Software. The announcement of the liberation of Netscape
Communicator, in 1998, was the starting point of a rush of many big companies to appreciate the
significance of Open Source Software[3]. Since then, Open Source Software has grown to
command a substantial market share. Gartner [4] shows that 85% of companies are already using
Open Source Software, with most of the remaining 15 percent expecting to do so within the next
few years. Apache (an Open Source web server) is running on 62.71% of the world’s web-servers
while Microsoft’s Internet
Information Server (IIS) is running on 18.37% [3].The use of Open Source Software, especially
as a supporting infrastructure for proprietary products, is a widely used and essential element of
the business strategies of major companies from IBM to Apple and Oracle [5]. Today, most of
Dell laptops are sold pre-installed with Linux (Ubuntu), which is an open source operating
system.
Open source technology has grown with time and its applications are now available for every
common type of enterprise software including databases, application servers and Web servers,
Web browsers, office applications, network monitoring software and security management
software. Information management Systems and academic management systems are also
available in various forms and versions [6].
Open Source Software and tools despite being easily available has it's cons too. Availability of
the source alongside such systems means institutions and companies can modify the systems to
suit their requirements. However this form of modification means the institutions in question
must have the expertise to modify the available source code. This comes as an extra cost since the
companies have to recruit personnel with the desired skills or outsource the service from
renowned software development companies. However, the freedom with which the source codes
can be changed and ease of access of Open Source software and tools makes the technology more
attractive. The cost of customizing an open source software and reduced vendor dependency
cannot be compared to the cost of acquiring fully developed proprietary software also coupled
with vendor dependency and locked source code.
The purpose of this paper is to present the benefits that learning institutions in Kenya can reap by
adopting the use of Open Source Technology and its products. The paper also details a list of
Open Source Software and tools available for use in learning and teaching as well as general
operations in institutions of learning in Kenya. The paper is based on the findings of a research
conducted in two major public Universities in the country. The study aimed to answer the
following research questions:
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
52
What are the various forms of Open Source Software being used in Kenyan institutions of higher
learning?
What are the reasons underlying the use of Open Source Software in institutions of higher
learning in Kenya?
The objectives of the study were to find out the various forms of Open Source Software and tools
available in the software market as well as the reasons why many users opt to use such products.
The study was based on a conceptual framework with Open Source Software and its various
forms as the independent variable and its impact as the dependent variable. Age, education level,
working or teaching experience and technological exposure were considered as moderating
variables.
2. PROBLEM STATEMENT
Training and producing competent programmers and software developers in general from
institutions of learning requires exposure to the practical programming world and the source code
behind the various software in existence. As a complement to the many available proprietary
software, open source technology has addressed this major concern of availing source code.
Today, Open Source applications are available for every common type of enterprise software and
the development and use of such software is still on the rise[6]. Most of these software solutions
are readily available as free downloads hence making them easily accessible.
There is, therefore, the need to inform learners as well as academic staff on the available open
source software and tools as well as their benefits and impact on learning and teaching. Hence,
this paper presents an evaluation and in-depth exploration of the impact that Open Source
technology and its products have had on institutions of higher learning in Kenya.
3. METHODOLOGY
A case study approach was employed in this research. Yin [7] defines the case study research
method as an empirical inquiry that investigates a contemporary phenomenon within its real-life
context; when the boundaries between phenomenon and context are not clearly evident; and in
which multiple sources of evidence are used. The target population consisted of academic staff
and students as well as heads of ICT sections, and directorates in the two institutions. The choice
of this population was suitable for this research because institutions of higher learning exhibit
most of the possible areas of open source software application and effect. These institutions were
purposively sampled in order to represent institutions of higher learning in Kenya.
A sample size between 30% and 50% of the aggregate population was deemed reasonably
sufficient and representative enough, especially in descriptive and correlation studies [8].
Therefore, in this study, at least 50% of the lecturers in charge of computer-based courses and the
students undertaking such courses were selected. In addition, heads of ICT sections or
directorates were selected and interviewed. Therefore, a total of 400 students and 50 teaching
staff were issued with questionnaires while two heads of ICT sections were interviewed. This
sampling technique was suitable for this study in that it enabled the researcher to effectively
capture the target population and also identify only those respondents with appropriate knowledge
in the research area.
In order to collect primary data, both questionnaires and interview schedules were employed
during data collection. Questionnaires were appropriate for this study because they could be used
to collect a wide range of data. Questionnaires were also quick to administer and offered a
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
53
standardized form of response [9]. Questionnaires were also suitable for collecting data over a
large sample [10].
Descriptive statistics was used to provide a concise summary about the samples used in the study
as well as the measures. This is because descriptive statistics are best suited for simplifying a
large amount of data in a sensible way [11]. The qualitative data from open-ended questions in
the questionnaires was analysed by reading through them to identify any information relevant to
the research objectives and then frequencies were tallied to tabulate data from respondents. SPSS
was then used to analyse the simplified data and draw the required figures and graphs. Available
literature was also reviewed in order to obtain the opinion of other researchers. The results of the
analysis were then presented using pie charts and bar charts so as to aid the researchers in
drawing valid conclusions.
4. RESULTS, DATA ANALYSIS AND PRESENTATION
Available literature shows that Open Source technology has had a huge uptake rate despite having
mature and viable versions of proprietary software and tools in the market. Proponents of Open
Source technology have put forward several reasons to support the increased embrace of the
technology. Enterprises find that they consistently get great value and the desired return on
investment (ROI) from Open Source Software [12]. The quality of Open Source Software met or
exceeded the expectations of 92% of the respondents to a recent survey[12]. Meanwhile, 87% of
the respondents said that Open Source Software delivered the cost savings they were hoping for.
Open Source applications can be even more secure than their commercial equivalents [6]. Open
Source communities fixed security vulnerabilities twice as quickly as commercial software
vendors do [13]. These features and the desire to reduce dependence on software vendors and to
have open license for acquired software have been the steering factors to widespread
development and use of Open Source Software. The favourable acceptance of Open Source
products by business and the direct involvement of major IT vendors in Open Source Software
development have transformed Open Source technology from a fringe activity, developed for
public good, to a mainstream, commercially viable form [14]. On the other hand, the
collaborative nature of the Open Source Software culture makes use of a wide volunteer
community, which conducts its development activities in a decentralized environment that has the
direct result of effectively lowering production costs and improving the software quality [15].
However, for learning institutions, the reasons vary due to mode and area of application. This is
because institutions of higher learning use the technology both in learning and teaching as well as
day to day operations and administration of the institutions. Institutions of higher learning have
special reasons for using open source software. This is because institutions of higher learning
have found open source software to be cost-effective and can save them money. Even in the
richest countries, schools are short of money. Open source software gives schools, like other
users, the freedom to make copies and redistribute the software, so the school system can make
copies for all the computers they have. In poor countries, this can help bridge the digital divide.
This rather obvious reason, while important, is shallow and, therefore, should not be considered
as a key reason for choosing this kind of software because a learning institution is more than just
operation cost. In reality, today's open source movement is more mature, and the trends
underlining it are more advanced and widely engaged. The revolution has had a significant
impact, and to treat Open Source as if it is still about saving a few bucks on a software license or
socking it to Microsoft is to misunderstand how far the Open Source movement has come.
Consequently, Open Source Software has found more use in these institutions because it permits
faculty and students to learn how the software works. To learn to write software well, students
need to read and write a lot of source code. They need to read and understand real programs that
people really use. They will be intensely curious to read the source code of the programs that they
use every day. Such opportunity is not possible with proprietary software, thus learning
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
54
institutions may prefer using Open Source Software for learning purposes. This is because Open
Source Software encourages everyone to learn.
According to the data obtained from the study, the students and members of teaching staff cited
ease of access, ease of use, lack of vendor dependency and enhancement of learning and teaching
as some of the major reasons why they prefer using Open Source Software and tools in learning
and teaching, respectively. Out of the students involved in the study, 366(91%) affirmed that they
always use Open Source Software and tools in learning while 48(96%) of the members of staff
affirmed that they always make use of Open Source Software and tools in teaching as shown in
Figure 1 and Figure 2, respectively.
Figure 1: Students’ responses to their use of Open Source Software and tools in learning
Figure 2: Teaching staffs’ responses to their use of Open Source Software and tools in learning
Students were also required to rate the relevance Open source software and tools has had in
learning. Their responses are as shown in Table 1.
Table 1: Students' responses to relevance of Open source software and tools in learning
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
55
The fact that Open Source Software and tools are readily available as free downloads makes them
affordable by students hence making them easy to acquire. Such software and tools also come
bundled with their source code which the students can review and modify hence making them a
major resource in learning of software-based courses. In addition to students and teaching staff,
the study also focused on heads of information and communication technology (ICT) sections
with a view to establishing why they use open source technology in the daily operations of the
institutions. It was established that the institutions of learning prefer using products of open
source technology because they are flexible since the source code can be modified to suit the
needs of the users; there are automatic updates and security patches readily available online; and
also because open source comes in versions compatible with the various operating system
platforms. This gives users the freedom to use Open Source Software and tools without worrying
about their operating system platforms. The data obtained indicates that
300(81.96%) of the students use OSS because they are easy to acquire, 350(95.63%) said they use
OSS because they are easy to use while 280(76.5%) and 290(79.23%) of the students said they
use OSS because there is no dependence on vendors, and they enhance learning, respectively as
shown in Figure 3.
Figure 3: Students' responses to why they use Open Source Software and tools in Learning.
On the other hand, 48(100%) of the teaching staff said OSS is easy to acquire, 44(93.75%) said
OSS are easy to use while 45(93.75%) of the staff said there is no dependence on vendors while
using OSS. In addition, 48(100%) of the staff said that OSS enhances teaching of software based
courses as shown in Figure 4.
Figure 4: Teaching staffs' responses to why they use Open Source Software and tools in teaching
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
56
The participants of the study also mentioned the availability of open source software and tools in
a wide range of forms and versions, which are readily available as free downloads as another
major reason why they widely use the technology in learning, teaching and general daily
operations of the institutions. Some of the mentioned software and tools include web servers,
Operating systems, content management systems, MYSQL tools, network management systems,
security management systems and browsers among others. In this regard, 300(81.97%) of the
students said they have used OSS's web servers which includes Apache, 280(76.5%) said they
have used OSS's Operating systems which include Linux while 200(54.64%) of the students said
they have used content management systems such as Joomla. The data also indicated that
350(95.62%) of the students said they have used query language tools such as MySql admin and
Navicat, 250(68.31%) said they have used OSS's Network Management systems such as Squid
while 240(65.57%) and 220(60.11%) of the students said they have used security management
systems and enterprise resource planning systems, respectively. The students stated having used
ERP in relation to learning and not office use. This is as shown in Figure 5 and
Figure 6, respectively.
Figure 5:Students’ responses to the types of Open Source Software and tools they use in learning.
This is because ERP offers a good tool for learning modular method of programming since its
design and development is based on modules that represent the various sections of use in an
organization. This data clearly presents the various forms of Open Source Software and tools
available for use in institutions of higher learning in Kenya.
Figure 6: Teaching Staffs’ response to the types of Open Source Software and tools they use in teaching
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
57
All the individuals involved in the study rated open source technology products as either very
relevant or relevant, respectively. This clearly shows that emergence of Open Source technology
has had a huge uptake and positive impact in teaching, learning, and daily operations in
institutions of higher learning in Kenya.
5. DISCUSSION OF FINDINGS
The main purpose of this paper is to present the benefits Institutions of higher learning can leap
from adopting Open source technology in academia as well as general day-to-day operations. The
findings of the study clearly shows that there is a wide range of open source tools currently
available for use by both staff and students. These tools which range from web servers to
operating systems. This finding answered the question What are the various forms of Open
Source Software being used in Kenyan learning institutions? This was one of the research
questions. In addition the study established that many users prefer using open source software and
tools because they are readily available, updates and patches can be easily obtained online and
also reduces dependency on vendors. These findings were based on the question, What are the
reasons underlying the use of Open Source Software in institutions of learning in Kenya? Open
source technology has gained popularity and its adoption continues to increase. The answers to
these two major research questions as obtained from the findings of this study clearly confirm
this.
6. CONCLUSION
Access to readily available open source software and tools together with their source code has
enabled students in institutions of learning to review and modify such codes. This has in addition
to imparting them with practical skills in programming, exposed them to the various frameworks
behind such systems. Open Source technology reduces the time frame required in coming up with
a functioning software. All a developer needs is customize an existing software to suit a client's
requirements. However, to gain such skills students need to interact with as much source code as
possible. This has been possible with existence of Open Source software and tools. By embracing
Open Source technology, institutions of learning can train and produce market ready
programmers who can take advantage Open Source customization and emerge as qualified
software developers.
The findings discussed in this paper have clearly outlined the benefits which many companies
reap by utilising this technology. Such benefits are far reaching for institutions of learning since
they exhibit both sides of the software utilization (Learning/teaching and general daily operations
of the institutions). By embracing Open Source technology, these institutions are, therefore, able
to minimize general cost of operations that could have otherwise been incurred in procuring
suitable proprietary software and tools for learning and teaching and general operations in these
institutions. Students and teaching staff are nowadays able to access the source code behind an
application and, therefore, making learning and teaching easier, interesting and more practical.
Such applications are within reach of the students as well as the teaching staff for free. They do
not have to fully depend on one vendor for support since updates and new versions are regularly
availed through the Internet. There is also flexibility to review or change the source code to suite
the institution's desired output. This coupled with security, deployment, easier customization,
greater interoperability, performance and greater longevity have seen the uptake of Open Source
Software and tools become huge thus making the technology very attractive as compared to
proprietary products. Today, there is an open source application for use in almost every sector
including networks, security, academia as well as cloud computing. The users of open source
software or products no longer have to worry about copyright infringement issues. This is
because legal hassles, in terms of having unauthorized copies, breach of licenses, unintentional
copyright forging, all are almost eliminated when you use open source product. This paper,
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
58
therefore, highly recommends all learning institutions to embrace the use of Open Source
products in learning and teaching as well as general operations since the benefits of this
technology are huge and far reaching. There is need for all students undertaking software-based
courses to use Open Source products for learning because they will have the freedom to review
and modify the available source code hence acquiring much market needed skills in software
development. The institutions of learning will therefore be sure to produce market ready
programmers already equipped with the relevant programming skills.
7. RECOMMENDATIONS OF THE STUDY
Based on the foregoing findings of the study, there is need for learning institutions to adopt
teaching of open source technology in their syllabus so as to increase the uptake of open source
products in the academia and make learning of software based courses easier and practical. In
addition, faculties and academic departments should embrace open source technology in teaching
software based courses so as to equip their students with the market desired practical skills.
Students also should increase their interaction with open source tools and their source codes in
order to increase their programming skills and equip themselves with the market desired skills in
software development.
REFERENCES
[1] Raymond E.S. (1999), The Cathedral and the Bazaar, O’Reilly, Sebastopol, Calif, USA.
[2] Koru A.G. & Tian J. (2004), “Defect handling in medium and large open source Projects,” IEEE
Software, vol. 21, no. 4, pp. 54–61.
[3] Kasper E. (2003). Technological Innovation in Software Industry; Open Source Software
Development. Technical University of Denmark, Denmark.
[4] Gartner (2009). 85% of companies use open source software.Retrieved from
http://www.dokeos.com/en/node/491 on 6th,May 2011.
[5] Netcraft (2011). May 2011 Web Server Survey. Retrieved from
http://news.netcraft.com/archives/category/web-server-survey/ on 24th April, 2011.
[6] Fadi P.D. & James A.M. (2007). Open Source: Technology and Policy. Cambridge University
Press.
[7] Portelli B. (2010). Why Open Source? Part of the ECT News network. Retrieved from
http://www.ecommercetimes.com/rsstory/69788.html on 5th, May 2011.
[8] Yin R. K. (1994). Case Study Research: Design and methods. Thousand Oaks, CA: Sage.
[9] Mulusa,T.(1990). Evaluation Research for Beginners, Practical Guide. Nairobi.
[10] Kombo D. K & Tromp D. L. A (2006). Proposal and Thesis Writing: An Introduction, Daughters of
St.Paul, Nairobi
[11] Wild C. & Seber G. (2000). Chance Encounters: A First Course in Data Analysis and Inference pp.
49-54 John Wiley and Sons.
[12] Forrester (2010). Open Source Software's Expanding Role in the Enterprise. Companies Adopt Open
Source as Standard, A Forrester Consulting Study Commissioned by Unisys Corporation. Forrester
Research Inc.
[13] Veracode (2010). State of Software Security Report Volume 2. Retrieved from
http://www.veracode.com/reports/index/.html on 10th, January 2011.
[14] Fitzgerald B. (2006). “The transformation of open source software,” MIS Quarterly, vol.1 30, no. 3,
pp. 587–598.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
59
[15] Raymond E.S. (2001). The Cathedral and the Bazaar, O'Reilly, Sebastopol, California, USA.
[16] Somerville, I. (2016). Software Engineering, Addison-Wesley 10/e (Global Edition).
[17] Stallman R. (2009). Why schools should use open source software. Retrieved from
http://opensourceschools.org.uk/why-schools-should-use-open-source- software.html on 15th, May
2011.
BIOGRAPHY
Muthamia Cosmas is a software engineer by profession. He holds a bachelor’s degree
in Computer science (Software Engineering Option) and currently pursuing a master of
science degree in Inforation Technology. He is also currently working as a Systems
Administrator in Maseno University(Kenya)