The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study describes the current circumstances of both the construction and the utilization of the information resources in the private colleges through quantitative and qualitative research. Based on the investigations, the paper aims to answer two questions: what are the prominent factors influencing the integration and optimal utilization of foreign language information in private colleges, and...
TEAM X emerged in the 1950s is not a architects firm, more like a academic organization. Architects in TEAM X independently open their business, and their architecture thoughts are quite different from each other, but they came together by questioned the International Modernism Architecture. The various theories of urban and architecture proposed by TEAM X are still referential for China today. More...
In many real networks, the importance of the nodes is different from each other due to their different functions. Considering this reason, a new evolving network model is proposed in this paper, which introduces the node differences. By ranking the new nodes according to their importance, they are designed to connect different numbers of the existing nodes. The model analysis and simulation results...
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that phishing attackers have the adaptability to change their tactics with little cost. In this paper, we propose a novel approach, which is independent of any specific phishing implementation. Our idea is to examine the anomalies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.