The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an efficient O(n2) time algorithm for solving the helix generation problem of RNA to predict the predict the secondary structure of that RNA. It encodes the RNA secondary structures as an integer permutation of helices. The helices are pre-computed by the helix generation algorithm and each integer corresponds to a candidate helix. In this paper, a helix is formed only when three...
Digital clock is a very common and useful device to show the time and date. 7-segment, Alphanumeric, Liquid Crystal and Graphic displays are commonly used in digital clock. They show time in English character. But, we were motivated to design this useful device showing time in Bengali to respect our national heroes, who sacrificed their lives for our language in 21th February, 1952 as well as to introduce...
Email marketing is broadcasting commercial messages to a group of people using email. Currently, email marketing is consistently delivering relatively high return on investment (ROI) in a marketing field. However, collecting subscriber information and sending the email only to interested consumers is a major research issue in email marketing. This paper introduces a conceptual model for an effective...
Test case prioritization is a technique for selecting those test cases, which are expected to outperform for determining faulty modules earlier. Different phases of software development lifecycle represent the total software from different point of views, where priority module may vary from phase to phase. However, information from different phases of software development lifecycle is rarely introduced...
Bangla-2-Braille machine translator is implemented using rule based Discrete Finite Automata (DFA) [1]. Rule based DFA directs the necessity of generating regular expression from the DFA in order to validate the language model used for Braille conversion and extend the translator for better usability by the visually impaired people. In this work, we conducted experiments using structured and state...
Now-a-days, online interpersonal communications have become more preferable than face-to-face interactions. However, emotions play a significant role in online communication. Automatic extraction of emotions from the text is a hot research issue because it minimizes the communication gap and misunderstanding between users. To become emotionally more intelligent, our previous text to emotion analyzing...
taking into account, the need for handling clinical information under uncertainty from clinical domain knowledge and clinical data in clinical decision making, we proposed a new Belief Rule Based (BRB) Architectural Framework to design a clinical decision support system (CDSS). It can handle uncertain information to support the clinical decision making process. This paper describes how to design a...
In the modern science and information technology everyone wants to attach with latest technology and services. Although visually impaired people do not get proper light from the benefits of technology revolution due to lack of scope. Mongol Dip will give visually impaired population a great opportunity to connect with and contribute to the digital world. In this paper we present software named ‘Mongol...
Many nations worldwide are continuing to invest in electronic government (e-government) initiatives that now demand an investigation into how well users perceive the success of these initiatives. Currently, there exists a dearth of empirical evaluation of e-government success in particular for the Australian context. Our research project, reported in this paper, is concerned with developing a conceptual...
Modeling mobility in a large scale unorganized disasters using existing mobility models is a tedious and cumbersome task because they are designed for small scale and well organized disasters. In large scale unexpected disasters obstacles play a key role in determining the path of the nodes. Moreover, complete path from source to destination cannot be determined at the initial step. It is to be determined...
This research will design and develop a protocol that supports less packet drops and consumes a low retransmission time which is able to transmit data in a speedy and efficient manner within a wireless environment. This is vital in real time systems; specifically in way finding applications in order to gather critical information of patients, evade hazardous situations for disable persons, and receive...
Discovering the hidden knowledge from large volume of educational data and applying it properly for decision making is essential for ensuring high quality education in any academic institution. This knowledge is extractable through data mining techniques. Association Rule Mining technique aims at discovering implicative tendencies that can provide valuable information for the decision maker. In this...
Intrusion Detection System (IDS) is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by Signature based Network Intrusion Detection Systems (NIDS) to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behavior over the network like known attacks that...
The strategic benefits of computer based information systems have been well documented in the literature. In the same light, researchers have also unveiled various factors that promote strategic uses of computer based information systems. Among the identified factor is information technology infrastructure flexibility (ITIF). However, previous studies focusing on the contribution of information technology...
This paper presents a set of learning objects for supporting structured programming courses, which were created in collaboration with students from the Structured Programming module of the Information Technologies and Systems undergraduate program at our university. The learning objects are organized according to the syllabus of the module, which present step by step explanations and exercises for...
We live in age of knowledge and huge information technology, which lead to an ongoing debate about the role that information technology can play for knowledge management. On the one hand, information technology is used in organizations, and thus qualifies as a natural medium for the flow of knowledge to achieve their goals. At the other end of the spectrum, leading knowledge management theorists have...
Appropriately using information technology in kindergarten teaching is able to benefit for the development of young children, which requires kindergarten teacher has a certain educational technology literacy. This study used questionnaire to survey the level of kindergarten teachers' educational technology literacy situation. We choose 1,000 Henan rural backbone teachers who participate in the "National...
On the ground of reflection of learning and characteristic of study in mainland China, knowledge building integrating study of cognition and power of technology was taken as a new method which can give students more space to develop their ability. To change students' negative learning attitudes in ICT course in junior middle school, knowledge building was practiced by 2-step focusing on project-based...
Under the background of diversified social function and rich information, college students can think more actively and independently. Therefore, the traditional teaching mode cannot meet the needs of cultivating their creative thinking and innovative ability. However, the development of the modern computer information technology provides college students with an information platform to communicate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.