The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
School level ICT policy plans are increasingly attracting and gaining more attention of researchers around the world to integrate ICT in education from grassroots level. In spite of this, the schools are unaware about how to develop their own school level ICT policy plans and build ICT policy capacity. In this research the emphasis is given on how school level ICT policy plans are being developed...
Phishing is a considerable problem differs from the other security threats such as intrusions and Malware which are based on the technical security holes of the network systems. The weakness point of any network system is its Users. Phishing attacks are targeting these users depending on the trikes of social engineering. Despite there are several ways to carry out these attacks, unfortunately the...
With the development of computer science and technology and the further progress of IC fabrication, GPU-accelerating computer systems are more and more widely used to provide higher performance on HPCs(High Performance Computers) and even regular desktop and laptop computers. Almost the same time, the Internet era and the rise of mobile Internet produced PBs of data. Bulk data are useless until carefully...
Because the phenomenon about unreasonable arrangement of college students' class hour is relatively common, the system designed a public colleges and universities ordering system based on WeChat. This system took use of convenience and openness of WeChat, which can tremendously simplify the development and promotion. At the same time, online ordering for the students provided a convenient way of eating,...
The lasting popularity of many social Q&A websites, such as Yahoo! Answers and ResearchGate, has become valuable knowledge repositories for people to search for answers to questions in various aspects in life. Finding the most relevant questions is often a non-trivial task, and a fine-grained classification system of questions will be an important aid. Existing work mainly focused on classifying...
Nowadays, mobile computing is the norm of everyday life. People use mobile device such as iPhone communicate with each other by email, WhatsApp and WeChat etc., by video conference with Skype, and by eLearning with Blackboard etc. However, seldom people use mobile device to practice music, and there is not yet a standard methodology for people to do eLearning for music with a mobile device. This paper...
This paper presents an optimal coordinated operation framework for minimizing the overall electricity cost of distributed internet data center (IDC) microgrids, which consists of cost of purchasing power from main grid, the operation cost of onsite generations, and the cost of carbon emissions. With forecasted day-ahead and real-time locational marginal prices (LMPs), the proposed model could help...
Digital capacity is of vital importance for the digital natives to live in both physical and virtual world. However, seldom research on digital learning capacity could be found in literature. This paper aims to investigate the framework of digital learning capacity for digital natives and the status of Chinese students' digital learning capacity according to a proposed digital learning capacity framework...
In these days, wireless AP's signal is all around us. Multiple APs are set up at a big area, enterprise, university, movie theater, etc. and small area, such as a private house. So wireless APs are not special to us. However, the APs with several tools that can manage multiple APs are hard to find and also too expensive to the public. To solve this problem, this paper discusses how to install the...
A user-orientation behavior profile is present to analyze demand for telecommunication and Internet services. This paper proposed a system for analyzing service demand used to simulate usage under various assumed conditions. A User behavior profile, together with a prototype profile, is simulated and tested. A User behavior profile is constructed in detailed segment to improve the accuracy of services...
This paper compares the Information and Communication Technology (ICT) infrastructure between Saudi Arabia and Gulf States universities, the latter consisting of Qatar, Oman, United Arab Emirates (UAE) and Bahrain. A questionnaire, expert-reviewed and pilot-tested, was used to collect data from ten universities in Saudi Arabia and five in the Gulf States. It covered the perspectives offered by faculty...
After a physical crime occurs an important action typically takes place: the reporting of the crime to the police. However, this action becomes more complex for a victim to properly execute when a cybercrime is experienced, which can be partly explained for instance by a lack of knowledge about cybercrimes and computer security. Cybercrime reporting is crucial because it can provide a multitude of...
Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations...
Modern information technologies are developed every year. Today they are used in virtually all areas of human life. This work investigates the impact of using information-communicative technologies in system of higher education on the example of modular object-oriented dynamic learning environment LMS Moodle. The results obtained testify the effectiveness of the use of such technologies, in particular,...
Honeypots and honeynets are unconventional security tools for the purpose of studying techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, we focus on information about the locations, shapes of geographic features and the relationships between them, usually stored as coordinates and topology (spatial...
European introduction of the eight key-competences and implicitly, the educational curriculum restructure at primary level by redefining educational outcomes and the introduction of the general and specific competences, led to the development in the Romanian educational system of the educational policy focused on skills training. The training based on competences has as premise the focus of the teaching...
This case study analyzes the availability and uses of teaching techniques and computing technologies in Grades 10, 11, and 12 Computer Applications Technology classes in a remote town in South Africa. The technologies and techniques trialed showed promise of usefulness in being more engaging to student interest than those presently used. The technologies were a bit tricky in setting up and it was...
SIPTA — Informatic System for Working Papers in Auditing is a CAATT (Computer Assisted Audit Tools and Techniques) running in a web environment, technically developed by statutory auditors and other professionals of auditing in Portugal. It was developed according to the need of these professionals by using an appropriate software at work, and can be classified in different categories of CAATTs, because...
While playing the communication game “Are You a Werewolf”, a player always guesses other players' roles through discussions, based on one's own role and other players' crucial utterances. The underlying goal of this paper is to construct an agent that can analyze the participating players' utterances and play the werewolf game as if it is a human. For the first step of this underlying goal, given...
The market penetration of in-home entertainment systems is playing a crucial role in the diffusion of interactive multimedia services. In this context, thin-client game systems have received a lot of attention, shifting the computational burden of the game play toward the server while the client renders a fat video stream. This paper proposes an analysis of the network characteristics of the Remote...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.