Search
Now showing items 101-110 of 120
Learning games for children with intellectual challenges
(
IEEE
, 2012 , Conference Paper)
This paper discuss the design of the current educational tutorials and games which are developed for children with intellectual challenges who are resident in the Shafallah center for children with special needs in Doha, ...
An ontology-based system to dynamically extract multimedia elements for children's tutorials
(
IEEE
, 2012 , Conference Paper)
Children with intellectual disabilities are very challenging to teach, and can learn best with the use of different methodologies that engage their senses, such as using images, sounds and clips. In this work, a new ...
MeMaPads: Enhancing children's well-being through a physically interactive memory and math games
(
IEEE
, 2012 , Conference Paper)
Obesity has recently become an epidemic that endangers the well-being of all the modern societies, especially the young generations. The lack of physical activity is considered as one major reason that contributes to such ...
An Arabic-based tutorial system for children with special needs
(
Springer
, 2012 , Conference Paper)
In spite of the current advance of the use of computers in education in the Arab world, complete suites of solutions for students with special needs are very scarce. This paper presents an assistive system managing learning ...
Understanding Simple Stories through Concepts Extraction and Multimedia Elements
(
Springer
, 2012 , Conference Paper)
Teaching children with intellectual disabilities is a challenging task. Instructors use different methodologies and techniques to introduce the concepts of lessons to the children, motivate them and keep them engaged. These ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
Compliance checking for usage-constrained credentials in trust negotiation systems
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
A novel technique for extraction of geothermal energy from abandoned oil wells
(2012 , Conference Paper)
This paper investigates the possibility of design and construction of a geothermal heat exchanger suitable for installation in abandoned oil wells. Based on the in-situ data collected, an amenable heat transfer numerical ...
On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software
(
IEEE
, 2012 , Conference Paper)
The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks ...