The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most information systems (IS) research focuses on the effect of gamification or the impact of emotions on IS adoption. Moreover, no study differentiates between digital natives and digital immigrants, although theoretically there should be differences in their IS adoption. Digital natives are those from the generation that has grown up with digital technology, their characteristics and behavior are...
The internet of bio-nanothings has become an important research topic last years, because of the broad opportunities for the new applications that it provides. The key problem which should be solved is a creation of its-bio interface for integration of the living substance into the cyberspace. This paper formulates the general conjugation principle of a living substance with an info-communication...
Recommender system is an application that filtered personalized information based on user preference from large information obtained. However, in order to provide effective and efficient recommendation it is necessary to accurately construct user's interest and taste. In constructing the user interest and taste there is need to obtain accurate feedback from user on the recommendation. In order to...
It is known that, for teenagers, internet addiction ratio is proportional to smartphone addiction. It means that, for same school age group, the higher internet addiction ratio is, the higher smartphone addiction ratio is. The research purpose of this paper is to investigate correlation of internet addiction and smartphone addiction of teenagers. For this purpose, extensive internet addiction survey...
The purpose of this study is to investigate correlation of internet addiction and school age. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are analyzed. Based on thorough statistical analysis, it is concluded that there is a meaningful correlation between internet addiction and school age.
It is known that man is more immersed in internet use than woman. Actually, internet addiction ratio of man is higher than internet addiction ratio of woman. The research purpose of this paper is to investigate correlation of internet addiction and gender. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are gathered and analyzed. Based on...
Today internet has become easily accessible which allows the user to perform multiple tasks such as access information, do study, make friends, online shopping, search for anything they want and many more. Similarly people do use internet to know the better options and find out relevant alternatives of product, services, places like wise. But searching for better choices may become frustrating and...
This research proposes user interface requirement guidelines when designing a tour website for older people. At the moment, because of the increased shift from manual to an automated method to acquire services such as accessing a tour websites, it is important to give more attention to design and development that caters to the needs of the older people. Currently, there are some design problems in...
One of the core skills that Computer Science undergraduates master is to create finite automata and regular expressions from natural-language descriptions of formal languages. It is quite common for such descriptions to be ambiguous (or appear to be so), particularly when instructors or students are not fluent in the natural language. Two questions arise: (1) Can an instructor unambiguously convey...
Advances in Internet technologies have opened up new opportunities in relation to medical image interpretation. This task can be accomplished outside the hospital using distributed medical imaging applications. In this paper, a Java-based distributed medical imaging application is presented. This application is able to access to a remote medical image dataset via a network and provide the necessary...
Today, much of the content that needs to be learned by students is not intrinsically motivated to students. This paper reports a qualitative study on investigating inquiry based learning model in learning computer studies. The research questions are: Do students enjoy inquiry based approach in learning Computer Studies? Q2: Do students benefit from inquiry based approach in learning Computer Studies?...
A significant volume of security breaches occur as a result of human aspects and it is consequently important for these to be given attention alongside technical aspects. Researchers have argued that security culture stimulates appropriate employees' behavior towards adherence. Therefore, work within organizations should be guided by a culture of security, with the purpose of protecting the organization's...
The network traffics of Denial of Service (DoS) rise in large scale. Adaptive detection technologies for large-scale DoS network behaviors are needed urgently. For the above, a detection method for large-scale DoS behaviors based on Artificial Immune System is proposed in this paper. The feature collection technology is used to efficiently capture large-scale network data. Network features are analyzed...
In this thesis, we present a kind of chat corpus in Chinese word segmentation and we also present its construction process. This kind of chat corpus works in the way of combining application of automatic segmentation technology with the method of manual correction. Thereinto, the automatic segmentation is performed in the way of using the Natural Language Processing Information Retrieval (NLPIR)....
This paper presents a descriptive study based on an online simulator of computer skills for primary school teachers in northwest Mexico. It was developed in order to serve as a research instrument in a funded project by the National Council of Science and Technology (CONACYT) and Centro Regional de Formación Docente e Investigación Educativa del Estado de Sonora (CRFDIES). The system was developed...
In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et al already developed Bit Level Encryption Standard ver-1, 2, 3, Bit level Multi way Feedback encryption standard. Recently Nath et al also developed 2-dimensional and 3-dimensional multiway feedback encryption standard. In the present...
Computers and Smartphone's becomes vital part of everyday life and hence use of internet becomes more and more. Due to internet, computers are becomes vulnerable of different kinds of security threats. Therefore it is required that we need to have efficient security method in order to avoid leakage of important data or misuse of data. This security method is called as Intrusion Detection System (IDS)...
In this paper we will discuss on how electronically linked Brain to Computer Interface(BCI) and Computer to Brain Interface(CBI) can be used to develop Brain to Brain Interface(BBI). In this system, non-invasive technology is deployed to achieve conscious Brain to Brain(B2B) communication. At BCI site, data is transmitted using ElectroEncephaloGraphy (EEG) a non-invasive method to record electrical...
Sustainable software is a software that able to work in a constraint environment. For example, a classroom without Internet facilities or unstable connection; a field trips; a meeting room or discussion room with inadequate computer facilities and power and etc. In this case, how to enabling a daily activity within such situations without losing the benefits of computer support? This paper presents...
Women comprise over 49.19% of the population of Pakistan. The number of women enrolling in Computer Science and Information Technology is 14%. Computer science (CS) and Information Technology (IT) is becoming ever present in the lives of young people, including girls and young women, yet education and employment in technology fields are not attracting women. The main focus of this research study is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.