The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design process and testing of NaVaSH, a stand-alone software application for conducting online exams. Initially, it starts with depiction of various related softwares and later RGUKT Examination System has taken as the basis and survey results were presented. Next the detailed description of NaVaSH modules along with their new features has explained with the help of intermediate...
This paper presents a study case about the application of low cost remote experiments in physics classes in Brazilian public schools. Practical activities are extremely important in teaching sciences; however, most Brazilian public schools do not have laboratories. Thus, remote experiments can be an efficient way to meet this need. The use of open source tools is an alternative to proprietary technologies,...
A recent Pew research center study of mobile device usage revealed that, African American and Latinos are the most active users of the Internet from mobile devices. The study also revealed that minority cell phone owners take advantage of a much greater range of their phone's features compared with people of other ethnicities. At Winston Salem State University (WSSU), it is common for students to...
Since increasing complexity and scale of modern software products imposes tight scheduling and resource allocations on software development projects, a project manager must carefully triage bugs to determine which bug should be necessarily fixed before shipping. Although in the field of Mining Software Repositories (MSR) there are many promising approaches to predicting, localizing, and triaging bugs,...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
This paper proposes a hybrid infrastructure construction of multi-functions digital public address (PA) system, which consists of wired and wireless communications architecture. Wireless communications ability can be achieved by dedicated USB dongles such as WiFi, WiMax, 3G, and LTE. Wireless communication can be used for disaster areas or some regions where is difficult to install wired-based PA...
We study the vulnerability in domain name system, so called as "Ghost domain names", which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies...
Cloud services must upgrade continuously in order to maintain competitive. However, a large body of empirical evidence suggests that, upgrade procedures used in practice are failure-prone and often cause planned or unplanned downtime. In this paper, we first define what is cloud service online upgrade, and then we analyze the shortcomings of current mainstream cloud service online upgrade mechanisms...
The specification of Trusted Network Connect (TNC) proposed by Trusted Computing Group (TCG) can improve network security from the inside, which has become the focus of security research field.. A policy server based on TNC architecture, which focus on endpoint integrity, is proposed. We discuss its work flow and communication process. and the simulations show the feasibility of this server used in...
Universities require a fast and reliable system to provide academic advising to its students, register them into different courses, and to manage change requests. Currently in Bangladesh, academic advising is done mostly on paper, as seen in many of the public and private universities. In this paper, we propose a unique online-based system that would make the university course advising and registration...
Owl Computing Technologies provides software and hardware that facilitates secure unidirectional data transfer across the internet. Bash scripts are used to facilitate customer installation of Owl's client/server software, and to provide high level management, control, and monitoring of client/server interfaces. With the evolution of more robust scripting languages, Owl now wishes to convert their...
With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attention in the scientific community. Exponentiations modulo a large prime have been considered the most expensive operations in discrete-logarithm-based cryptographic protocols, and they may be burdensome for the resource-limited...
The paper presents a remote-desktop based Net Magic remote debugging RNP (Remote-desktop based Net Magic Remote Debugging Platform) model for the situation that hardware programming experiment is not often conducted in the network innovation experiment and teaching. It allows researchers to operate Net Magic remotely, which is a kind of open source hardware network study experiment platform, using...
Gradate and Higher Education sector is witnessing increase proliferation of education\campus management software for handling and management of all the data pertaining to the students, right from admissions to final graduation. Traditionally all these data was maintained using manual record\logs and the same was used as supporting documents for ISO and other quality audits\certifications. This transition...
Server Virtualisation (SV) can improve the application efficiency of network sever resources, reduce the investment of hardware and less the cost of maintenance. This paper analyses that five key factors that are hardware cost, energy cost, software cost, maintenance cost and outage (or downtime) recovery cost in the Server Virtualisation. There a sample case is an university or a company what its...
To facilitate reporting and approval of university scientific research and statistical research achievements using for performance evaluation, a research model for reporting and approval has been established according to rules and regulations of performance evaluation after software s of the same type had been investigation, On this basis, reporting system of Scientific and Technological Achievements...
Geographic information system is more and more widely used in our daily lives, it plays an increasingly important role in transportation, urban planning, and resource management. An effective testing method is required to ensure the correctness. At the same time, MongoDB can provide applications with lightweight scalability and high-performance data storage solutions. This paper uses CppUnit unit...
As people's water consumption become large and large in china, people begin to expect high requirements of water quality. However, some waterworks' monitoring system cannot automatically detect and process water quality parameters and system operation status. Therefore, staffs have to manual meter reading. The paper first discusses the design of the whole system, including the server side and the...
Because medical information is shared only in each hospital or among affiliated hospitals, it is not utilized effectively. If it can be shared between hospitals under definite conditions such as strict user authentication/authorization and anonymization, new applications such as knowledge sharing among an enormous number of medical doctors will become reality. Furthermore if the the servers or the...
While conducting experiments in the remote laboratories users gather data for further analysis. There are a few administrative and usability issues involved including authenticity of acquired data. This paper addresses the problems connected with the laboratory work reports provided by students. Possible places for experimental data storage are listed; pros and cons of each of them are discussed....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.