The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Business cards are defined as cards which contains some business information about a company or individual. Business card are usually includes a company name or business affiliation with a logo, in addition to some information about cards holders such as (holders name, street addresses, telephone number, fax number, e-mail addresses and website). Nowadays, it became very necessary for these cards...
A tele-monitoring system, based on a soft transducer network, developed by students of the Course "Measurements on Communications Network" (MRC), at the Department of Electrical Engineering and Information Technology, University of Naples Federico II, is presented. This project is the result of an innovative education approach for (i) overcoming specialization of single Courses on different...
In conditions of information technology growth, systems which are being developed to be used on multiple platforms, gain in importance and popularity. As a rule, such systems have client-server architecture and have strong security requirements for user authentication. In this paper the information technology of user authentication for cross-platform systems has been developed, which is characterized...
The article considers approaches to assessing the quality of applications submitted for participation in competitions, which are implemented in the automated project management system. These approaches allow us to evaluate the scientific background of the team of the project executors and the correspondence of the project's keywords with the selected CSCSTI codes (Codes of State Categories Scientific...
Hadith is the second source of Islamic law after Qur'an and an explanation of verses of the Qur'an. Today, there are many hadiths that appear and that are doubtful of its authenticity. The number of hadits that are doubtful of its authenticity or so-called dhaif and maudhu hadith can lead to errors in the determination of Islamic law for everyday life. The classification of hadith is required to know...
Nowadays the most used applications are the web based applications, for instance long range informal communication, shopping, e-learning, banking and social networking are all an examples of web based applications. It is commonly known that these Web applications are publicly available for all users around the world. This leads us to new challenges in securing these applications and exposing them...
As Thailand is a developing country, electrical resource management is one of the important foundations to enhance new and advanced technologies. It also enhances the well-being of the people with more increased average electrical power generation and consumption of the country. However, when we considered consumers, the power consumption behavior in each household is different. The different behaviors...
Several approaches and features have been introduced to analyze gait. Position of skeleton joints in 3-dimensional environment could be used to make gait analysis. The main goal of this paper is to develop an approach that can understand a person's gait cycle being used in various research areas such as social security, and medicine. People's distinctive gait cycle can give information such as neurodegenerative...
Thai language is derived from Bali-Sanskrit which is a language based on sounds and tones. Foreigners need to converse using Thai. The phonology of this language causes mapping from one system of writing into another and data control to be complicated. The calibrating of sounds from one language into a workable writing system called transcription as opposed of transliteration, which maps the letters...
One of the most significant systems operated in a university is the student registration system. The system provides student services such as student profile and course enrollment. A classical problem that students encountered is course and section selection. This task is tedious and time consuming for most students. In addition, students prefer to study with their friends. Our paper presents a novel...
Specific ingredients cautious people have difficulties in choosing products which written in Japanese language. Especially, people with the allergy has to be very conscious because wrong in take can cause death or allergic reaction. Thus we aim to develop Japanese ingredient facts recognition application. The process of this application goes as follow: first scan ingredient label of product and then...
Nowadays, Information Security specialists focus on the development of complex solutions for monitoring large enterprise networks. This paper is intended to document a security solution developed within Python programming language created for the use in LANs. Based on Open-Source software and constructed to run on low-cost hardware, this program is designed to run ad-hoc or on demand scanning across...
In this paper, an integrated architecture approach in designing and developing a DBLearn web-based application is presented. The DBLearn system is a personalized and adaptive e-learning system designed especially for learning practices in database courses. This approach focused on topics that are important but difficult for new learners, such as database design and structured query language (SQL)...
Advancement in Information Technology requires reassessment in decision making regarding investment for the success of project management. The barriers of an Information Technology project should be acknowledged before implementing an organizational innovation. The purpose of this paper is to summarize and analyze the risk factors that should be regarded in Information Technology Project Management...
E-Learning became an essential method for learning and is widely used in universities and educational institutions as an alternative learning environment for traditional learning that uses face-to-face meetings and paper-based assessment. One of the main features of e-Learning systems is that they provide the ability for conducting online assessments. This feature can be implemented by allowing students...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
The development of educational policies that improve educational systems needs intelligent automated tools for decision making. This need has motivated the development of a new system which can help teachers, schools, and decision makers in enhancing students' performance. The primary concern here is to monitor the students and help the teachers in building action plans that improve students' performance...
In telecommunication industry, fraud becomes a serious problem that affects telecommunications service providers all around the world. As a significant amount of revenue losses to fraud every year, so an efficient system to detect fraud activities is greatly required. A well-known fraud which affects GSM and PSTN service providers is Bypass fraud. It is used to avoid a charge of international calls...
Fingerprint is one of the most important biometrics that has been employed for verification systems. Fingerprint is characterized by two fundamental properties; Easy to acquire, and it is unique for each person. This paper presents minutia extraction method based on Neural Network-based. These features can be used in verification systems. The verification process includes four main phases: image acquisition,...
Public Distribution System is a government-sponsored chain of shops entrusted with the work of distributing basic food and non-food commodities to the needy sections of the society at very cheap prices. It is also an important constituent of the strategy for poverty eradication and is intended to serve as a safety net for the poor people whose number is more than 33 Crores and are nutritionally at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.