The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An enterprise resource planning (ERP) system is the backbone in an e-business framework and is a process-oriented business management paradigm. An implementation of an ERP system can achieve “real-time” and “integration”. The staffs with manipulation skills of an ERP system are thus demanded for enterprises. E-learning are increasingly widespread by using information and telecommunication technologies...
This article presents an exploratory study undertaken during the initial phase of the Adults Digital Literacy Project (LIDIA), aimed at identifying situations where adults are hindered from exercising their full citizenship, due to their lack of digital technologies knowledge. Within the framework of an action-research methodology, a questionnaire was applied to 106 adults, aged between 26 and 92...
Multimedia content is increasingly available in multiple modalities. Each modality provides a different representation of the same entity. This paper studies the problem of joint representation of the text and image components of multimedia documents. However, most existing algorithms focus more on inter-modal connection rather than intramodal feature extraction. In this paper, a simple yet effective...
South African communities are constantly being developed through new ICT projects and technologies which are initiated by individuals, government and private organisations. The problem with these developments is that they are implemented in isolation. This isolation causes limited sharing of resources, duplication, poor-governance of the resources, and in worse-case scenarios, failure of these projects...
Computer and Internet technology is a potential source of valuable general as well as health information and plays an increasing role in our everyday lives. The main objective or this study was to evaluate the use of computer and the Internet among older people. The study was conducted by the National Institute of Gerontology and Geriatrics "Ana Aslan" over a period of 6 months in 2015....
The past decade has seen a lot of research on statistics-based network protocol identification using machine learning techniques. Prior studies have shown promising results in terms of high accuracy and fast classification speed. However, most works have embodied an implicit assumption that all protocols are known in advance and presented in the training data, which is unrealistic since real-world...
Today each and every country is facing the challenge to keep up its competitive advantage vis a vis other countries. They have realized the importance of innovation, research and development as necessary tools to keep them competitive and build their leadership position. Engineers play a pivotal role in building such sustainable competitive advantage for the country by providing solutions to the various...
In the changing development industry, training for the project team members is necessary to maintain with the most up-to-date tools and techniques. The software development organizations that provide appropriate training to their employees can expect e a higher quality from their development. In global software development as project members are scattered geographically, the training for the employees...
The study aimed to evaluate the factors influencing the adoption of e-learning in Gezira University according to views of staff memb ers and recommended possible solutions to overcome challenges. Recently University of Gezira as well as some Sudanese Universi ties started to adopt e-learning as new me thods to facilitate teaching and learning. Sample of 150 staff members were selected randomly from...
Rapid technological development has affected teaching and teachers' work environment in higher education in many ways. Technology allows us to learn anytime, anywhere we want, but are the educators ready and what kind of skills they need to match the changing world. This paper aims to propose points to consider while planning support programs, internal training for higher education teachers in order...
The current research aimed at revealing E-learning dimensions and subjects which should be used for determining E-learning efficiencies faculty of education teacher students should own, and therefore it aimed to explore the effectiveness of Education college programs in Al-Aqsa University. For fulfilling the research objectives, the researchers utilized the descriptive analytical method, analyzing...
A troll is a user intent on sowing discord on the internet. We propose an approach to detect such users from the sentiment of the textual content in online forums. Since trolls typically express negative sentiments in their posts, we derive features from sentiment analysis, and use SVMrank to do binary and ordinal classification of trolls. With a small labeled training set of 20 users, we achieved...
With the increasing risk of data leakage, information guards have emerged as a novel concept in the field of security which bears similarity to spam filter that examine the content of the exchanged messages. A guard is defined as a high-assurance device used to control the information flow, typically from a domain with a "high" level of confidentiality, such as a corporate or military network,...
The explosion of the number of devices and users on the Internet results in massive amounts of data and information. This poses the most complex challenges in security we have ever faced. The detection of malicious domains and Internet protocol (IP) addresses has been a hot topic in cyber security. We present a scalable and effective graph inference system for detecting malicious domains and IP addresses...
The paper is devoted to the issues of automated categorization of textual information which can be applied in the systems intended to block inappropriate content. The approach used for feature selection and construction is proposed. The text mining methods used for research (Decision Tree classifiers) are analyzed. Besides that, the techniques of Web sites analysis that provide information in different...
Nowadays, while we are enjoying the convenience brought by such a huge repository of online web information, we may come across difficulties in finding the web pages we want related to particular information we are searching for. Hence, it is essential to classify web documents to facilitate the search and retrieval of pages. Existing algorithms work well with a small quantity of web pages, whereas,...
Speech are widely used to express one's emotion, intention, desire, etc. in social network communication, deriving abundant of internet speech data with different speaking styles. Such data provides a good resource for social multimedia research. However, regarding different styles are mixed together in the internet speech data, how to classify such data remains a challenging problem. In previous...
Impact of internet addiction should be further explored since its potential has caused several concerns among Malaysian employees. In addition, there is very little empirical literature concerning the implications of internet addiction and employee performance. This paper seeks to review the feasibility study done on 50 employees of private sector and government sector on internet addiction and the...
Document classification or document categorization is one of the most studied areas in computer science due to its importance. The problem is to assign a document using its text to one or more classes or categories from a predefined set. We propose a new approach for fast text classification using randomized explicit semantic analysis (RS-ESA). It is based on a state of the art approach for word sense...
With the development of Internet, the amount of Information has been rapidly growing which is spread widely. In order to improve the value and accuracy of science information that is pushed in this paper, an intelligence dichotomous method for science information categorization to identify science information from massive Web news is presents. During the experiment, 85.3% recognition rate of the recognition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.