The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fear of technology, computer illiteracy and linguistic challenges are the prime concern for uplifting the day to day lives of rural mass. This paper describes a unique platform called Gyansetu (meaning Knowledge Bridge) with specialized hardware and software, which simplifies the access of information from internet for the rural mass. The interactive GUI used within the framework is more image-driven...
The learning of reading is one of the challenges of school and one of its most important activities, because reading is the basis for other school activities and a fundamental element for the exercise of citizenship. The applied behavior analysis have been useful for the development of reading and writing instruction programs by means of two paradigms: the stimulus equivalence that seeks to identify...
In the era of the Big Data, cache is regarded as one of the most effective technique to improve the performance of accessing data. The majority of caches save each query result as a file, thus it is difficult to reuse the data from parts of some query results in the cache, and consequently some cached data were wasted. Through studying domestic and foreign related technologies, this paper designs...
First-year engineering students enter our university with differing experiences using computers and technology. This affects the classroom dynamic especially with large differences between students. With this in mind, faculty must address the following questions when planning their course: Where should the faculty focus their time? Do they focus on bringing everyone to a specific level? Do they teach...
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a novel classification algorithm called EST.Stemmer of Arabic text, it presents many important improvement areas which deals with some issues in Heavy Stemmers and Light Stemmers.
Many computer users lack awareness of the connections their computers make to hosts on the Internet. Some realtime tools exist for host-based network monitoring, but they are too complex for average computer users as they require expert knowledge to use and interpret. Connection Cartographer is a tool to let non-expert users visualize geographical information about their network connections in real...
Internet technologies have evolved into a point where it is possible to create web-based applications, comparable to those typically found on desktop computers and workstations. Web-based medical imaging applications can be used to perform medical image interpretation outside the hospital setting. This kind of application is launched in a browser and provides the necessary interpretation functions,...
Chat application is a feature or a program on the Internet to communicate directly among Internet users who are online or who were equally using the internet. Chat applications allow users to communicate even though from a great distance. Therefore, this chat application must be real-time and multi platform to be used by many users. The development of information and communication technologies are...
A significant number of Moroccans use cybercafes on a regular basis for work and leisure. Unfortunately, if these cybercafe machines are infected with malware, such malware can steal users' passwords and other sensitive information. Assessing cybercafe security in Morocco can help assess the risk that users encounter when using cybercafes. However, to the best of our knowledge, there is no academic...
In 1986, this author presented a paper at a conference, giving a sampling of computer and network security issues, and the tools of the day to address them. The purpose of this current paper is to revisit the topic of computer and network security, and see what changes, especially in types of attacks, have been brought about in 30 years. This paper starts by presenting a review of the state of computer...
In this paper, we consider some educational aspects related to mathability. Our main goal is to approach an answer to the question what are computer assisted ways to assimilate mathematical knowledge and possess mathematical abilities.
In this paper, we implement a video effect process allocation scheme for Internet live broadcasting. Recently, Internet live broadcasting services have widely spread. In the Internet live broadcasting services, users add special effects to videos in real time. However, a delay occurs to process and broadcast videos because of the poor performances of users' devices. Therefore, we have proposed a method...
Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting...
ICT/technologies are increasingly pervasive and embedded in everyday things and objects, constituting a relevant aspect of social identities. Furthermore ICT use continues to be a highly gendered area of life in all socio-economic and educational backgrounds, and a source of significant social inequality in enduring ways. Gender and ICT/technologies is an international growing field of research that...
Every year, companies are searching for professionals in cybersecurity more than ever before; however, there is a big void in the pipeline. Interestingly enough, the largest source of security incidents are unintentional insiders, which demonstrates the need for cybersecurity education not only for developing cybersecurity workforce but also to raise mere awareness and consciousness about these issues...
In order to be able to successfully defend an IT system it is useful to have an accurate appreciation of the cyber threat that goes beyond stereotypes. To effectively counter potentially decisive and skilled attackers it is necessary to understand, or at least model, their behavior. Although the real motives for untraceable anonymous attackers will remain a mystery, a thorough understanding of their...
Digital Forensics is a branch of forensic science. Today the internet users continue to grow day by day, therefore crimes related to the internet also increases. The process of digital forensic is using digital devices to extract the information and identify whether the device has been hacked before or being viewed. The prime objective of Digital Forensic is to gather the “evidence” of crime scene...
The purpose of this paper is to adapt a few sentiment analysis methods to obtain sentiment value for social network statements in the Polish language. Developed methods represent different approaches. Starting with PMI-IR, expansion of dictionary through conjunctive connections method, to determining bigram sentiment by analyzing its neighborhood. Obtained results were compared to the commercial solution...
In order to better understand the emergence of online social networks, researchers usually employ state of the art synthetic topological models which can replicate some of the observed real-world social network characteristics. However, these characteristics rely on the analysis of common graph metrics at a certain point in time, when the snapshot of the real-world data is obtained. In other words,...
The paper gives some basic view on use of multimedia when teaching foreign language. The concept of multimedia in connection with education process involves a few technical didactical instruments, which during the school supplies development appeared as a part of educational process. In classical education the most used sense in absorbing information is hearing. With the use of multimedia is the most...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.