The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Academic misconduct is a frequent practice. Some examples are: to copy a work in whole or in part and present it as your own, or to buy academic work online. Introductory Computer Science courses are not an exception of these inappropriate situations. In projects (coding activities done in groups outside class) we use automatic plagiarism detection tools such as MOSS and JPlag. In addition, we have...
To make open source software development successful, acquiring contributors from outside is an important factor. However, despite the need for external contributions, many projects have disappeared without being able to acquire contributors. GitHub, an Internet hosting service for the purpose of open software development, is widely used for research projects of related topics. However, different from...
Community of Inquiry (CoI) model is a framework with socio-constructivist roots, which describes an online learning community on three interdependent components: cognitive presence, social presence and teaching presence. Content analysis is widely used to examine transcripts of computer mediated conversations between students in a community of inquiry. However, there are no dedicated support tools...
Internet of Things (IoT) solutions are increasingly being deployed for smart applications. To provide good communication for the increasing number of smart applications, there is a need for low cost and long range Low Power Wide Area Network (LPWAN) technologies. LoRaWAN is an energy efficient and inexpensive LPWAN solution that is rapidly being adopted all around the world. However, LoRaWAN does...
The live teaching is a new form of online education, the learning goal has a change from educators to learners, i.e., educators become the target to be evaluated by learning activities and online learning develops into interactive learning. However, new challenges are imposed upon the development of teachers' behavior. This paper explores the behavior of teachers in live teaching from the perspective...
We consider the canonical shared link caching network formed by a source node, hosting a library of $m$ information messages (files), connected via a noiseless multicast link to $n$ user nodes, each equipped with a cache of size $M$ files. Users request files independently at random according to an a-priori known demand distribution q. A coding scheme for this network consists of two phases:...
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN), Interest names introduce novel vulnerabilities that can be exploited. By setting up a malware, Interest names can be used to encode critical information (steganography embedded) and to leak information out of the network by generating anomalous Interest traffic. This security threat...
Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver benefits to any application in a computer. However, incorporating new protocols to the Internet is a challenging...
Archiving of the Internet traffic is essential for analyzing network events in the field of network security and network forensics. The bitmap index is widely used to achieve fast searching in archival traffic data requiring a large storage space. As current state-of-art, WAH, PLWAH and COMPAX are proposed for compressing bitmap indexes. In this paper, a new bitmap index compression scheme, named...
Internet has witnessed its paramount function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) and Content-Centric Networking (CCN) emerge as a clean slate network architecture to embrace this shift. Pending Interest Table (PIT) in NDN/CCN keeps track of the Interest packets that are received but yet un-responded, which brings NDN/CCN significant features,...
Real-time video communications has been incorporated into many instant communication tools such as ichat, Skype, QQ, etc. Real-time video communications has low delivery delay requirement, which imposes great challenge to the provisioning of such services. To address this problem, in this paper, we propose a selective redundant transmission mechanism to support real-time streaming on multi-interface...
The Internet is facing the accelerating growth of routing table size. Backbone routers' routing table has already reached 512k entries, which has a negative effect on the scalability of the Internet. Hierarchical addressing and locator/ID separation solutions have been proposed to address the scalability issue. However, there has been little focus on how to efficiently represent hierarchical location...
Efficient retrieval of traffic archival data is a must-have technique to detect network attacks, such as APT(advanced persistent threat) attack. In order to take insight from Internet traffic, the bitmap index is increasingly used for efficiently querying over large datasets. However, a raw bitmap index leads to high space consumption and overhead on loading indexes. Various bitmap index compression...
In this study, we outline a potential problem in normalising texts that are based on a modified version of the Arabic alphabet. One of the main resources available for processing resource-scarce languages is raw text collected from the Internet. Many less-resourced languages, such as Kurdish, Farsi, Urdu, Pashtu, etc., use a modified version of the Arabic writing system. Many characters in harvested...
In this paper, an efficient quantization parameter (QP) assignment method is proposed for MPEG internet video coding (IVC). QP is one critical control point in video compression performance. Instead of assigning the same QP value for each frame, the allocation of different QP values can increase the coding efficiency of standardized video codecs such as AVC/H.264 and HEVC along with the special group...
In this paper, we consider some educational aspects related to mathability. Our main goal is to approach an answer to the question what are computer assisted ways to assimilate mathematical knowledge and possess mathematical abilities.
Named Data Networking (NDN) is a promising future Internet architecture which retrieves the content using their names. Content names composed of strings separated by '/' are stored in the NDN Forwarding Information Base (FIB) to forward the incoming packets further. To retrieve content through their names poses two main challenges for the NDN FIB: high memory consumption and high lookup time. Therefore,...
Recent technological advancement in mobile technologies had changed the learning process for urban poor group in Malaysia. However, the main problem is lacking of understanding of the factors that drive urban poor to use m-learning. Thus, the main objectives of this exploratory research are (i) to identify the factors that drive urban poor to use m-learning and (ii) to provide recommendations to improve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.