The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Geolocation databases are widely used for mapping Internet devices' IP address to the physical location. However, there are inconsistencies between them. It is difficult to avoid because the methodology used by database provider to gather their geographic information is different. Moreover it is impossible to update database in real time. Yet by analyzing inconsistencies between geolocation databases,...
This paper presents the results of a study on the perceived challenge of e-learning with special reference to the National Program for Technology Enhanced Learning (NPTEL) offered by the Indian Institutes of Technology (IITs) and Indian Institute of Science (IISc)jointly. The programme has been used to model learner requirement and expectations through technology enhanced and online learning worldwide...
This paper presents architectures and prospective outcomes of two ICT (Information and Communications Technology) systems those are just convened aiming at supporting the international student mobility actions among tertiary educational institutes. The mobility of international students in the higher education has profound effects on the students' learning goals and their future careers. Every government...
This paper describes a blueprint for the proper design of a Fair Internet Regulation System (IRS), i.e. a system that will be implemented in national level and will encourage the participation of Internet users in enriching and correcting its “behavior”. Such a system will be easier to be accepted by Western democracies willing to implement a fair Internet regulation policy.
This paper is positioned around the notion that in an era of ubiquitous computing and digitalization of data, the Information Assurance in Security and Privacy (IASP) issues cannot be contained within geographic boundaries. Instead, they must be approached from a comparative cross-border perspective. Such a multi-dimensional inspection is even more critical because in the domain of electronic data...
The National Programme on Technology Enhanced Learning known as NPTEL is a joint programme executed by several Indian Institutes of Technology and Indian Institute of Science. It was launched in 2003 and has as its objectives the creation of curriculum material in higher education in all of science and engineering. It has created the largest freely accessible; curriculum based video archive in the...
This paper outlines the innovative engagement process used to develop a guide to online participation for New Zealand government agencies. The guide was intended to improve opportunities for New Zealanders to engage in policy development and service design and delivery through ICT applications, within the context of the long term development goals for the New Zealand State Services. In an interesting...
Libraries increasingly play an integral role as service providers in E-Government systems, but little has been done to assess the scope or trajectory of citizen needs in libraries. This multi-method exploratory study used a series of interviews, surveys, workshops and reference logs to identify trends in E-Government in public libraries, the E-Government support roles of public libraries, and citizen...
Participatory Technology Assessment (pTA) is a concept that prompts people to discuss technologies and channel their opinions into policy-making or actual development of the scientific or technological phase being introduced. It has been pointed out that pTA may become a necessary tool in the future. However, at present, the introduction of social progress regarding pTA has not been demonstrated....
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Classification of the numerical data is a very important research topic in machine learning. But the incomplete data is very common in real world application. And the existence of incomplete data degrades the learning quality of classification models. But the existence of incomplete data always decrease the quality of classification models, To show the definition of missing data more intuitively,...
Intelligent surveillance systems have become an important research issue recently. They can provide an early warning or help us to retrieve interested video frames. The motion detection techniques play an important role in these two applications. In this paper, we propose an effective surveillance video retrieval method based upon the motion detection technology. We can use this method to search frames...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Linear motion and out-of-focus blur often coexist in a surveillance system, which degrade the quality of acquired images and thus complicate the task of object recognition and event detection. In this work, we present a point spread function-based (PSF-based) approach considering fundamental characteristics of linear motion and out-of-focus blur based on geometric optics to restore coexisting motion...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
In this article, we propose a general-purpose disaster support system based on generalized (multiplicatively-weighted order-k Minkowski-metric) Voronoi diagrams. The proposed system is capable of handling disasters (or emergency units) having different weights in the complete order from 1 to k in the three popular Minkowski metrics (Euclidean, Manhattan and Maximum distance space). The proposed model...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
The net generation of students have characteristics which make them well-suited for participating in open source projects including being comfortable with information technologies, using IT as a form of communication, desiring to work in groups, a desire to do social good, and being fascinated by new technologies. The nature of open source projects where communities of developers from around the world...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.