The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The world we live in now is defined by the word “speed” and any device, technology, or system that doesn't keep up is rejected or replaced immediately. Because of this, one of the biggest concerns today is “optimization”. Its purpose is to reduce the impact on the user's device. The Anti-Virus industry is also confronting with this challenge. Although the first concern is to keep the user safe, providing...
This paper describes about the virtual desktop environment on Cloud computing. In the modern world, the tasks become more complex and difficult to accomplish which causes the existing of heavy load applications in an educational environment. The limitation of computer's specification in the school and universities' laboratory will affect the learning process. Therefore, this paper proposed development...
More memories will be required in a future server as the number of cores per microprocessor keeps growing, which means either the capacity of a memory chip or the number of memory chips connected to a microprocessor needs to catch up with the increasing core counts. With electrical interconnects between microprocessor and memories, layout and placement of memory chips around the microprocessor becomes...
As pervasive mobile computing becomes more of areality the question arises whether a mobile device such as atablet can be sufficient to serve as the sole personal computingdevice of a scientist. To this end the performance of an Androidbased tablet computer is compared to that of a Notebook. Due toits prevalence within the scientific community and its availabilityon both platforms, Python is used...
Cloud computing has become more and more popular nowadays. Both governments and enterprises provide service through the construction of public and private clouds accordingly. Among the platforms used in cloud computing, Hadoop is considered one of the most practical and stable systems. Nevertheless, as with other regular software, Hadoop still needs to rely on the underlying operating system to communicate...
In this paper we introduce a statistical study which enable us to know which are Windows APIs that are most imported by malware codes. To do that, we have used a given number of infected Portable Executable (PE) files and another number of none infected ones. We used statistical Khi² test to set if an API is likely used by malware or not. We guess that a given work is necessary and important for behavior-based...
There is a rapid growth in the development of mobile phone applications which are widely used around the globe. Different cultures may affect the usage of such applications; there is a need to explore the cultural differences in this context. In order to study such differences, those icons which interpretability might be affected by culture differences are taken into consideration and hypothesized...
Computer security, school security policy and school computers usability should be important for all school computers and network resources users. But instead of implementing security policy, users often unintentionally compromise computer functionality and security out of ignorance or negligence. Since Windows is the default operating system in the majority of Croatian schools, students often have...
Personal Software Process (PSP) is a structured framework which aims to improve overall performance of software engineers in an individual level. PSP practitioners need to extensively collect their development data using specially designed tools. However, all currently available tools have limitations such as disruption and unstructured documentation. These unfortunates could subsequently reduce potential...
The main building block of Wireless Sensor Network (WSN) is sensor node consisted of four basic elements: the sensor unit, processing unit, communication and power units. In this paper we propose the Raspberry Pi, cheap, flexible, fully customizable and programmable small computer board and abilities of its usage as WSN node and SensorWeb node. The Raspberry Pi brings the advantages of a PC to the...
As the use and demand for computers are growing so fast, it is very important that every student today acquire computer basic training. Computer literacy will give them all the benefits and advantages to progress their education and future career too. Sudanese students start learning computers at high secondary school. The computer science curriculum at the Sudanese high secondary schools aims at...
Honeynet represents the new theory in network protection. Unlike purely defensive methods such as Intrusion Detection Systems (IDS), Data Encryption and Firewalls that try to avoid interaction with the attacker, Honeynet is based on the idea of interaction with the attacker. During this interaction, the Honeynet records all of the attacker's actions and tools used without the attacker knowing, representing...
STUDSAT-1 is the first pico-satellite developed in India by the undergraduate students from seven engineering colleges across South India. After the successful launch of STUDSAT-1 on 12th July, 2010, the team is developing STUDSAT-2 which is India's first twin satellite mission. STUDSAT-2 is undertaken by the undergraduate students from seven engineering colleges from the State of Karnataka, India...
Cloud computing as a new developed from the network to calculate the network application model, from the appearance has a broad application space and prospect. Overview is presented in this paper, on the basis of the characteristics and principle of cloud computing, cloud computing service mode is discussed and the operating system, operating system for yuan calculation is analyzed, studied the application...
Forensics analysis of physical memory is a key point in computer living forensics. Most of the research carried out focusing on enumerating processes and threads by accessing memory resident objects. However, collecting case sensitive information from the extracted memory content is import and difficult in computer forensics. Password plaintext is one of the most concerning sensitive information to...
Enhancing network performance has been studied by a number of researchers. The need to provide greater throughput on network infrastructure has been the key driver for these studies. The use of jumbo frames is considered one of the methodologies that can be employed to increase data throughput on networks. It can carry data payloads ranging from 1500Bytes to 9000Bytes which can be supported by Gigabit...
Technological development in India is going to be highly dependent on mobile communication technology. The innovation boom in this particular sector is expected to reach over one billion subscribers by the end of year 2013. The prime benefit of mobile technology and services is providing reach ability to all sectors of the subscriber's choice. New devices and services are being introduced rapidly...
We present WebGT, the first web-based system to help users produce ground truth data for document images. This user-friendly software system helps historians and computer scientists collectively annotate historical documents. It supports real time collaboration among remote sites independent of the local operating system and also provides several novel semi-automatic tools that have proven effective...
One of the ways that malware infects is by exploiting weaknesses in computer systems, often through conditions in software. When this happens, software and operating system vendors must repair these vulnerabilities by patching their software. However, vendors can release patches but cannot force users to apply them. Malware attempts to proliferate without regard to the state of the infected system;...
The today computers, as taught in the elementary computer architecture courses, are based essentially on the principles, suggested by von Neumann in a 1946 report. Since that, only minor improvements have been carried out, although the impressive technical developments seem to hide this fact. In the meantime, also a whole software industry has grown up, and masses of society are using computers, sometimes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.