The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Critical thinking is one of the main goals of higher education to ensure that students are competent in the future. The growth of information technology and internet access among students is effective factors to improve the instructional approaches for fostering critical thinking in online environments. Although many researchers have studied on cultivating critical thinking, many do not consider the...
Information literacy is kind of basic quality for adaptation to the information society. In this research, we clarified the association relationship between students' information literacy and their learning ways. With good information literacy, students can have good learning ways which lead them learn more efficient, and they are more adept at using a variety of information resources, better play...
With the rapid growth of e-Services (e-Learning, e-Health, e-Gov, e-Farming and the like), it is important that everyone can access such valuable services and get associated benefits. While such services are accessible and widely used by most educated people having access to the Internet via computers or high end phones, such services are not accessible by many people on the other side of the Digital...
As a type of word of mouth, online reviews have great impact on both consumers and sellers. As objective and subjective reviews from different sources may differ emotionally, their impacts and target readers may differ accordingly. Our study firstly uses text semantic analysis and multiple linear regression models to explore the emotional tendency of reviews from different sources. Our results show...
This paper studies development Internet resources, driving force and use Internet, taking account local characteristics of Uzbekistan. The result shows that, intention to use Internet in local segment of Uzbekistan was significantly high in “business”, “entertainment” and “social”. Beside it comparable low visiting information resources in category of “science”, “education”, “divisions of Government”...
In recent years, there are many papers have discussed how to develop the digital campus and IT in education and most of universities of China have invested a large of money on it. After years of development, many people have been aware of the primary drawback in the development that is many universities focus on the hardware development, but ignore to develop software. Many universities on digital...
Achievement of agricultural development in the 21st century depends on the wide use of information and communication technology. Due to determined effects of information and communication on different aspect of agriculture, this paper illustrate the role of it to reduce agricultural losses, forecast productivity, do food labeling, educate farmers, sale products electronically and do e-commerce.
With the popularity of the Internet and the rapid development of information technology, Web application has become an integral part of the information age. Ajax (Asynchronous JavaScript and XML) is a new interaction method between server and client side, and asynchronous interactive technology is involved with Web applications, so that applications could give users more efficient response and a good...
DDoS attacks has brought severe damage to the Internet Today's internet security has increasingly become a severe threat. For DDoS attacks characteristics we judge abnormal flow of data by RaiiTa criterion and control flow by token barrels filter to avoid abrupt flow.
Today, students acquire basic computer skills at the early stages of their lives through several courses taken at schools before university and social online environments where they can engage with their friends. As a result, students may become more reluctant to attend similar courses in universities. A similar situation has arisen recently with a service course, which is given to all first year...
The World Wide Web has been recognized as a significant Information and Communication Technology (ICT) to educate and empower consumers by providing information on their health problems, prevention/management of diseases and related health services. It has the ability to reach those with limited access to information, potential for online support/interaction, access to volumes of information on a...
This paper discusses the design and use of a digital community noticeboard (called Nnub) located at a suburban general store. The intention is to design information and communication technology (ICT) such as situated displays and Internet technologies to support local communications. We use a reflective, agile, and iterative design (RAID) framework to evolve the technology, aiming to engage local...
The California Institute for Telecommunications and Information Technology (Calit2) at the University of California, San Diego has developed a variety of Web 2.0 tools to help ??socialize?? research with the goal of helping support the creation of large multi-disciplinary teams, identify new funding opportunities, track the interest of corporate partners, and present a data-driven representation of...
In this paper we are proposing an information integration approach based on minimalist-upper ontology that can be applied among Web 2.0 applications. Instead of following conventional ontology engineering principles we are proposing to facilitate the use of collective intelligence, one of the major locomotives of Web 2.0, for the development of minimalist-upper ontology that can be shared among more...
The data lifecycle means the process from datapsilas advent to its disappearance; the data management runs through the whole data lifecycle. Data management aims at providing the data which are complete, accurate and conducts time effect for userspsila data retrieval. At each stage of datapsilas life cycle, different demands exist upon data management, among which data store management is the most...
Previous researches of the anti-spamming have proved that results can be greatly improved when bad seeds are used together with good ones. However, how to select bad seeds efficiently is a big challenge. In this paper we discuss how to select bad seeds based on good seeds selection. The experiments running on over 13M Web pages show that our method is practical and time-saving. Moreover, the selected...
Deep web refers to the hidden portion of the WWW (World Wide Web) which cannot be accessed directly. One of the important issues in the WWW is how to search the hidden Web. Several techniques have been proposed in order to address this issue. In this paper, we have surveyed the current problems of retrieving information from hidden Web and proposed a solution to solve these problems using probability,...
The problem of processing XML streaming data fits a large class of new applications and has been a hot spot recently. The XML streams on the World Wide Web are usually autonomous, distributed and heterogeneity. All existing methods, however, do not support processing a collection of XML streams from heterogeneity data sources. In this paper, we address the heterogeneity issues in the context of XML...
Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.