The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hive computing has gone by many names and has been used for various applications from simple business to complex scientific problems, over the years. In the modern world, Hive Computing and Virtualization have been put in use to accomplish various tasks[1]. The benefit of using the Virtualization technique is that it allows creation of a virtual version like a virtual hardware platform, operating...
On the policy level, Tanzania has strongly committed to Information and Communication Technology (ICT) supported education on all levels of education. National policy documents give ICT a high priority in development of the country's educational system. Curricula have been revamped to accommodate for increased role of ICT in the society and education. Also educational institutions have explicated...
This paper evaluates the impact on participants and members of their households of access to a free computer and internet at home. Graduates of the Computers in Homes (CiH) programme in Porirua were used for this study. This programme is a Digital Literacy initiative that operates in conjunction with the National Computers in Homes project in New Zealand. This research followed a qualitative approach...
To develop the rural community and to mitigate the burden of unemployment in Bangladesh, ensuring students participation to run the Information center at micro level could bring a positive change throughout the country. Youth participation could be ensured through the school based information center (SIC). This paper aims at illustrating possible ways through which the facilities of a telecenter can...
The purpose of this study was to assess the educational divide and computer literacy among primary school students located in a rural school as well as an urban one Specifically the places are in Sabak Bernam and Shah Alam, Selangor. Demographic profiles play an important part in determining the education divide between the schools such as family background, income, parents' educational qualification...
Rural living labs are an approach for enabling user driven ICT-based innovation initiatives geared towards economic and social development in rural areas. They also provide an environment for open innovation based on partnerships between all stakeholders. There are few deployments of Living Labs in South Africa and in Africa in general. The benefits of these deployments vary from place to place depending...
E-learning with information digital technologies have fostered a rapid expansion in recent years, distance education is a form of education in which students are separated from their instructors by time and/or space. This paper analyzed and discussed the digital technology for e-learning in distance education. Distance education systems consist of a complex array of infrastructures and personnel....
With the advent of Knowledge Management in our modern economy today, this rapid growth of information transformation is a great symbol of modern civilization. ICT plays a major role in educational system that will equip the students the much needed knowledge, skills they need in modern day competition. As technology combined with modern teaching pedagogies, this makes the learning process more interesting...
Education is one of the most debatable topics in all over the world and so it should be. With limited time and limited resources the nation's future and its people depend on the efficiency of schools, colleges and universities. The world is undergoing a revolution in ICT that has tremendous implications for the current and future social and economic situation of all countries of the world. The application...
Style-based text authorship identification extracts features from authorship-known texts, constructs classifier and then identifies disputed texts. Authorship identification belongs to the domain of style classification and is a branch of text classification. In contrast with text classification which deals with the content of texts, authorship identification focuses on the form property of texts...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
In this article, we propose a general-purpose disaster support system based on generalized (multiplicatively-weighted order-k Minkowski-metric) Voronoi diagrams. The proposed system is capable of handling disasters (or emergency units) having different weights in the complete order from 1 to k in the three popular Minkowski metrics (Euclidean, Manhattan and Maximum distance space). The proposed model...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
With the progress of researches on the integration of Geographic Information System (GIS) and Remote Sensing (RS), digital earth, and information sharing, to publish RS images on Internet has become a significant research work. This paper presents an efficient algorithm to build image pyramid model for convenient data storage and retrieval and proposes two distributed cutting algorithms under the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.