The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Reflective Denial of Service attacks (DRDoS) represent an ever growing security threat. These attacks are characterized by spoofed UDP traffic that is sent to genuine machines, called amplifiers, whose response to the spoofed IP, i.e. the victim machine, is amplified and could be 500 times larger in size than the originating request. In this paper, we provide a method and a tool for Internet...
This workshop considers to share some experiences of educational practice of technologies used in English courses at the Technological Institute of Costa Rica, known in Spanish by its abbreviation (ITCR) throughout three years. There are three cases chosen using technological tools such as Facebook, Google Plus and the blog. Although courses at the ITCR are face to face, some technological components...
This paper analyzes popular visual practices of the self-presentation in the visual content of social media in nowadays Russia. Our key question was to understand wide spreading and specificity of social practice of selfie. Using the iconographic method (E. Panofsky), we study visual content of selfie aiming to reveal the hidden rules of their reproduction. The results of an empirical study of random...
Every year, companies are searching for professionals in cybersecurity more than ever before; however, there is a big void in the pipeline. Interestingly enough, the largest source of security incidents are unintentional insiders, which demonstrates the need for cybersecurity education not only for developing cybersecurity workforce but also to raise mere awareness and consciousness about these issues...
An Application-Programming Interface or API provides a set of program functions that can be used to build new applications. In this paper, we study how to use the expectation-confirmation theory (ECT) to identify API usability problems, and what obstacles a novice developer faces when learning a new API and its accompanying development tools. We conduct a study over the impact of using a visual editor...
Zero shot learning (ZSL) provides a solution to recognising unseen classes without class labelled data for model learning. Most ZSL methods aim to learn a mapping from a visual feature space to a semantic embedding space, e.g. attribute or word vector spaces. The use of word vector space is particularly attractive as compared to attribute, it offers vast auxiliary classes with free parts embedding...
Internet and social media has attracted most users to earn extra income. Instagram originally used for visual storytelling, is now also used for a variety of things; such as to online shop. Instagram has convenience features like uploading photos and comments, that can make online seller can be successful in managing their business. But in the end, they realized that Instagram is not e-commerce that...
Internet usage is rising at a frenzied rate as knowledge and information sharing becomes easy and time-saving. Regrettably, the visually impaired do not enjoy this liberty and they have difficulties in using the computer and the Internet to obtain any shared and published information. This difficulty is also faced by the visually impaired Bahasa Melayu (BM) language medium Internet users. Existing...
Methods are described to create more accurate sub sets of user data by introducing dead bands into data clusters. User data is collected and then mined. That produces clusters of data. Dead bands are then generated to delineate and describe the data in the clusters more accurately. This is accomplished by classifying data inside the newly created dead bands as NOT being in either of two or more clusters...
Currently the use of Information Technology and Communications, media skills and audiovisual literacy should relate directly to the academy, the mass media and technologies have the power not only to entertain but also to educate and contribute to the process of teaching and learning; in order to promote critical users. This research uses a survey process to identify the level of media literacy and...
The rapidity with which information travels on the Internet makes it unquantifiable. To analyze it, it's necessary to define the area; so, the dissemination of information on Science and Technology through Twitter is the premise of the investigation. The study seeks to highlight the importance of social networks in the field of science and technology and their influence on the democratization processes...
This paper presents a PhD thesis proposal in Informatics Engineering, scheduled for completion in July 2018. This PhD thesis is part of Spatio-Temporal Information Systems, with applicability in technological communication tools and visual representation of knowledge, for Digital Media (newspapers, radio and television). It is intended to maximize the efficiency and effectiveness of the value of heterogeneous,...
Visualization and processing of geographic information is an important part for a Spatial Data Infrastructure (SDI). Choose the software system to accomplish this task is laborious and complex. To assist SDI implementers to define which systems should be used, this article analyzes some of the currently available systems and used by a variety of existing SDI in order to provide information for decision...
Some of the greatest challenges for Software requirements elicitation are related with the identification of what is needed to be developed and with the understanding of the organization business rules. In this context, this paper aims to suggest the use of Comic Books in the process of requirements elicitation within a business model and evaluate the results of applying this technique. To reach this...
In this paper it is presented a usability evaluation of an entertainment platform, well-known, YouTube. The main aim is to study how people with intellectual disabilities interact with the layout and uses their search field option. We intended to observe and analyze performance and satisfaction but also if the interface can give them autonomy on the search option. The results show that participants...
In our days we have an unmanageable data. Legislation of free access to information is developing. In journalism there are reports that presents big data amounts in didactic visualizations, infographics, maps, etc. This format is call Data Journalism. By having such us free access to information access to information, journalists are allow to interactive with audience.
This article have as objective to analy se the advertising and the diverse methods of diss emination of ideology, whereby, many people bec ome supporters of determinate groups of guerril has, emphasizing the technological means.
Survey is a scientific method used for analysis of various phenomena. The advancement of technology, which automates and simplifies data collection, significantly increases the number of possibilities for implementing such method. The Information Visualization (InfoVis) techniques can improve the analysis of such data by facilitating the results representation and interpretation. Given the wide variety...
In this article we present and discuss a prototype for a mobile application to manage the drug regime of a wearer. From a survey of requirements, along with doctors, pharmacists and users of the national health system, we designed a prototype of FARMACIL application, for which we have obtained very promising results in acceptance testing, from a universe of people in various age groups.
In recent times there has been a decline in the confidence of common people over electronic voting machines (EVMs). More anticipated than what the reality actually is, today's automated vote casting methods have faced immense controversy related to being vulnerable to hacking and questions have been raised about their transparency and security. This paper proposes the design and development of a novel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.