The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design process and testing of NaVaSH, a stand-alone software application for conducting online exams. Initially, it starts with depiction of various related softwares and later RGUKT Examination System has taken as the basis and survey results were presented. Next the detailed description of NaVaSH modules along with their new features has explained with the help of intermediate...
We study the vulnerability in domain name system, so called as "Ghost domain names", which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies...
Universities require a fast and reliable system to provide academic advising to its students, register them into different courses, and to manage change requests. Currently in Bangladesh, academic advising is done mostly on paper, as seen in many of the public and private universities. In this paper, we propose a unique online-based system that would make the university course advising and registration...
This paper shows our design of a hybrid control model for flow-based networks. There are many research efforts related to the flow-based networks, however, our work was inspired by OpenFlow technology. Specially that OpenFlow was counted as a key enabler technology for Software Defined Networks (SDN). Thus, it has a great potential to improve the current Internet by providing new functionalities and...
File-sharing is the major application of P2P Network, it is the resource sharing demand that directly led to the generation of P2P technology and development boom. Worldwide, BT and eMule has always been the mainstream system in the field. But in China, P2SP service providers with thunder as the representative rise rapidly, and open up the market with a so-called intelligent resource selection technology,...
Safe deployment of web interfaces for remote instrumentation requires that the laboratory system be protected from harmful manipulation by end users or attacks from malicious software over the internet. Industrial control systems, although highly relevant to contemporary engineering education and an essential component of many remote experiments, are typically only designed to run in a secured local...
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key techniques for monitoring LAN, such as process automatic loading and hidden, network covert communications, network data secure transmission, to...
JSON is moving from being an underground secret, known and used by very few, to becoming the clear choice for mainstream data applications. The first Web extra is a video interview with Douglas Crockford on the creation of JavaScript Object Notation (JSON). The second Web extra is an audio podcast by Charles Severance, author of Computing Conversations.
The Network Testbed at Binghamton University was designed to facilitate security research in the area of advanced IDS. It offers a secure, controlled environment for experimental analysis of the efficiency of various intrusion detection/mitigation and computer forensics systems. It allows for staging large scale experiments with real self-propagating malware on thousands of interacting heterogeneous...
IP traceback can be used to find the origins and paths of attacking traffic. However, so far, no Internet-level IP traceback system has ever been deployed because of deployment difficulties. In this paper, we present an easily-deployable light-weight IP traceback based on flow (EasyTrace). In EasyTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an...
We describe the educational cloud layer of our Cadabia middleware. This layer will permit users to specify the machines which will be used for copies of the materials for various groups that they have joined. This kind of “personal cloud” will help to protect data for both individuals and institutions, while making other data searchable by those who have used similar ontologies.
Cloud computing is low-cost, high-performance network application model, is gradually affecting study, work and life of people. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of campus network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform, which can...
Academic staff at research-intensive universities have played a strategic role in fostering talents needed by the country and improvement of the core competitiveness of the university. Therefore, it is extremely crucial to build a team of excellent academic staff while continuing to improve their professional capacity and their competiveness in the global market. The construction of a fair and efficient...
Practical training of software skill is important for software talents who urgently required by services outsourcing industry. We build a self-training system based on campus network which can provide services to those students or teachers to train themselves at the free time. The system is integrated on whSaaS together with TrustIE and an enterprise background. The portal shows resources integration...
In recent years, there are many papers have discussed how to develop the digital campus and IT in education and most of universities of China have invested a large of money on it. After years of development, many people have been aware of the primary drawback in the development that is many universities focus on the hardware development, but ignore to develop software. Many universities on digital...
The construction of digital campus is of great significance for the modernization of Chinese higher education. This paper explores and practices the technology and new methods in three-dimensional virtual campus system, develops a powerful digital campus platform, which lay a solid theoretical foundation, and accumulated a wealth of practical experience for the realization of the whole campus especially...
This paper describes school library application which is used in several elementary and high schools in Serbia. It is a software solution that enables quick and comfortable work to librarians. Its purpose is keeping evidence of all books and magazines in a library and retaining information regarding checkout of these books and magazines. It considerably shortens time needed to find a person that borrowed...
For our project ldquoInformatik@Schoolrdquo we introduced a didactical concept that is based on individual and cooperative problem-oriented teaching and learning. To apply this concept we practice an approach between pure e-learning and blended learning. From the technical point of view we need a software environment that fulfills the demands of our didactical concept. In this paper we present our...
Real environments govern by societal rules, law, culture and set of assumptions. And there are law enforcement and other agencies to monitor and record the acts and behaviors of its residents and to make sure everything goes by the book. This paper introduces a tool that counts the presence of a person in the virtual environment (on the Internet) and examines the activities he/she conducts online...
This paper propose a novel software tool for recording intelligent web interactions to analyze what happened, when and how in the virtual world. The tool counts the presence of a person on the Internet and examines the activities he/she conducts online. These recorded interactions can help understand userspsila behavior based on their age, gender, demographics and experience. Paper findings, from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.