The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents an analysis of directions of development of cognitive information technologies for mathematical education. Two aspects of the problem are highlighted, they are a simulation of mental processes of a student and a modeling of a subject area. The proposed concept of development of cognitive informational technologies is confirmed by a retrospective analysis of information technologies...
Mining information from a database is the main aim of data mining since years. The most relevant information which one requires as a result of data mining is getting associations between various attributes. More preciously mining frequent itemset is the most significant step to initiate the mining operation. Most of the algorithms discussed in the literature require multiple scan of the database to...
In 2014, there were no pollution updates for Riyadh city which has effected the awareness about air pollution negatively. This research uses air pollution sensor to sense the air pollution in Riyadh city, and builds a system that manipulates the data, allows the user to calculate his own exposure level, and shows different representations of the pollution information for the public.
Both Gaussian integers and Lucas sequences have been applied in cryptography. This paper presents the mathematical relationship between Lucas sequences and Gaussian integers. It also explores the complexity of Discrete Logarithm Problem (DLP) for Gaussian integers modulo prime by reducing it to Lucas Sequences DLP and real integer DLP. We demonstrate that the algorithms based on the Gaussian Integer...
Information technology is the key technology that drives the technical convergence of formerly separated application domains. As the internet started in its early days with a data file transfer approach between geographically separated computers, today the internet already links a variety of devices from a broad application spectrum. While it's interesting to discuss whether new content drives new...
In this article we share a teaching CS subject experience at college of CS&IT, Albaha university with involving the students in our research activities.
Developed a Classification scheme of methods, principles and models of construction of hardware for implementation of function-specific drivers of primitive basic functions based on system analysis.
This paper tries to identify the effect of blended learning teaching mode on English writing teaching and learning in institutions of higher vocational education by conducting an experiment with the Academic English Writing course with blended learning mode. Through a SPSS statistic analysis of the pretest and posttest results of the experiment and a questionnaire, the author finally finds out that...
This paper investigates how different individual and institutional factors pertaining to ICT readiness influence teachers' adoption of game-based learning technologies. The data were gathered from Finnish primary, lower secondary and upper secondary school teachers (N=1668) with an online survey. The results indicate that openness towards ICT, ICT attitude and the ICT compatibility with teaching positively...
This Paper proposes a theoretical framework to evaluate IT Investments based on Composite IT Balanced Scorecard (IT BSC) which takes into consideration Behavioral Dimension represented by Unified Theory of Acceptance and Use of Technology (UTAUT). Clearly, the proposed framework extends the IT BSC to account for technology acceptance as a behavioral dimension along with other dimensions of IT BSC...
Data is increasing so rapidly that new data warehousing approaches are required to process and analyze data. Aggregation of data incrementally is needed to fast access of data and compute aggregation functions. Multidimensional arrays are generally used for this purpose. But some disadvantages such as address space requirement is large and processing time is comparatively slow in case of aggregation...
In this paper a digital learning display has designed especially for the children in rural areas from which they can learn Bengali and English alphabet and numbers. The display is formed cascading twelve 8×8 dot matrix displays so that the designed character patterns are attractive to the children. It can be controlled by an IR remote. Only a 12V DC battery is enough to drive the display. The power...
Cardinality estimation of underwater network is somewhat troublesome using terrestrial node estimation methods due to unique characteristics of underwater environment such as large propagation latency, node mobility, non-negligible capture effect, and high error rate. For this reason, a cardinality estimation method based on cross-correlation of Gaussian signals is proposed for underwater network,...
This paper illustrates a rule induction approach to discover decision patterns by using Dominance-based Rough Set Approach (DRSA) to unravel the intrinsic factors for learning successes and failures in a cooperative group-learning environment. It employs an innovative group quiz method in a university Management Information Systems (MIS) course which induces students into a unique learning process...
Sentiment Analysis or opinion mining is an area of important research over the last decade. The basic task in sentiment analysis is classifying the polarity of a given text whether the expressed opinion in the text is positive, negative, or neutral. This paper presents an approach to sentiment assessment from Bangla text using contextual valence analysis. In linguistics valence of a verb is the number...
We describe a methodology to detect semantic errors from Bangla sentences. According to Bangla grammar, a single verb can have many forms depending on its tense and person of its subject. The subject of a sentence can be noun or pronoun, may indicate human, animal, or any non-living entity. There is a fixed semantic relation between every verb and subject and object of a sentence. For example, a non-living...
In this paper, a comprehensive analysis of electroencephalogram (EEG) signals is carried out in the empirical mode decomposition (EMD) domain using a publicly available benchmark EEG database. First, the intrinsic mode functions (IMF) are extracted in the EMD domain. Next, normal inverse Gaussian (NIG) probability density function (pdf) is introduced and it is investigated whether the NIG pdf can...
Image based text extraction is one of the fastest growing research areas in the field of multimedia technology. The extraction of text from a complex or more colorful images is a challenging problem. Text data present in images contains useful information for habitual explanation, indexing, and structuring of images. Extraction of this information involves detection, localization, tracking, extraction,...
Classical Huffman codes have a very good compression performance over traditional systems. Yet, more efficient encoding is possible by considering and applying techniques that treat the binary bits differently considering requirement of storage space, energy consumption, speed of execution and so on. Future transmission systems are likely to be more efficient in many aspects. These systems will consume...
Any tree with n vertices is conjectured to be graceful if its vertices can be labeled using integers 0, 1, …, n − 1 such that each vertex label as well as the corresponding edge label is distinct throughout the tree. There has been multiple attempts with different approaches to prove this conjecture but it remains the same. Here we will discuss the methods used to solve this problem along with two...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.