The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study investigated the impact of technology-generated listening environments upon processing of cognitive information. The main question asked was: To what extent does background sound impact accuracy on a cognitive task? A total of 217 museum-goers (127 f, 90 m) completed a language categorization task in four different listening environments: rain sounds, fast music, calm music, and silence...
While most health systems serve the majority of their citizens well, each has its challenges and gaps that lead to inadvertent marginalization of certain populations. The engagement of traditional stakeholders in health - policy makers, patients, health professionals, health administrators - to address these issues are necessary but insufficient if unconventional solutions are to be discovered. Use...
Digital capacity is of vital importance for the digital natives to live in both physical and virtual world. However, seldom research on digital learning capacity could be found in literature. This paper aims to investigate the framework of digital learning capacity for digital natives and the status of Chinese students' digital learning capacity according to a proposed digital learning capacity framework...
The main purpose of analyzing the social network data is to observe the behaviors and trends that are followed by people. How people interact with each other, what they usually share, what are their interests on social networks, so that analysts can focus new trends for the provision of those things which are of great interest for people so in this paper an easy approach of gathering and analyzing...
This article presents the results of an eye-tracking experiment concerning a part of “My Little Pony” cartoon. The aim of the research was to find out the ways of watching animated auditions for children by adults, and how those ways differ among men and women. The text includes the description of the research procedure and the results of the research in terms of the most important measurements and...
Continuous analysis technique Audit as presented in this article to speed up the audit process aimed at reviewing controls, risk management and detection: fraud, suspicious and unusual transactions, errors, etc. The implementation is done by using CAATs (Computer Assisted Auditing Techniques) and a case of payroll where through the use of these techniques is facilitated illustrated: detecting variations...
This work aims to design a proposed decision support system (DSS) for helping investors in making investment decision by using rule text-mining based algorithm to analyze news headline and implement analyzing pro-gram based on a manual analyzed headlines. The news analysis program (NAP) was used as an important stage in making investment decision on sample of the Gulf Cooperation Council (GCC) stock...
Acquisition of volatile data for further forensic analysis still represents a challenge to both practitioners and researchers. The current tools used for acquisition of such data are focused exclusively on a way to capture content. However, the development of forensic science, in particular in the area of digital evidence in terms of the admissibility in court, has introduced additional elements to...
Pupils have always had access to different types of skills but nowadays, pupils are rapidly becoming powerful Internet users. If knowledge is also acquired outside the formal education system, most frequently on the Internet, then pupils will have access to a broad scale of educational locations, digital libraries, digital books, various educational portals, cyber cafes and similar places. In short,...
IBM is one of the top companies in technology and business field, the aim of the research is to measure the awareness gauge of computer science students and graduates about some of the main IBM cloud solutions which are IBM Bluemix, and Watson Analytics in Saudi Arabia. The method used in the research to measure the awareness was publishing both online and paper surveys. The surveys got a total of...
With the rapid development of Internet technology, related departments such as the party and government offices, enterprise organizations and national defenses will deal with a large number of digital archive information, some important data classified need transmit through the network. Study how to ensure the safety of the archives preservation and transmission is a matter of individual, collective...
In this paper, we propose a space character based reversible high capacity text steganography scheme which embeds the secret data into a Microsoft word document. The scheme hides the secret data bits into the white spaces by changing their font type and style. Since the white spaces are invisible characters, the changes made in their style as well as in their font type do not raise suspicion. Thus,...
The paper presents method of classification of user and system data based on the attributes. The method is intended to solve the problem of data classification in the internal audit of computer equipment with a large volume of data stored on the media. The parametric space of informative features for the classification task is defined. To conduct internal audit of computer technologies in order to...
This paper presents an approach to creating a speech interface for personal computing. The paper discusses the design principle followed in building the speech specific applications and the system architecture required to support them. Further, the paper focuses on the various functionalities implemented in the system to provide an insight to our approach. The applications implemented include e-mail...
Under the new situation, the network with a unique open, virtual, interactive features, makes the students participate in the higher degree and pays more attention to the Ideological and Political Theory Course, it can also optimizes and enhances the teaching mode. In the teaching practice of the curriculum "the Outline of Chinese Modern and Contemporary History" in Guilin university of...
With the highly development of media technology, the way to transmit information has changed significantly. Confronting with the challenge of age, book as the traditional media of information transfer should seek innovation strategy on the aspects of structure, function and form combined with the characteristics of electronic media. The structure of e-book can be multidirectional and irreflexive,...
In this paper, we propose a high capacity text steganography method using Huffman compression. The forward email platform is used to hide the secret data. We make use of the number of characters used in email id to indicate the hidden secret data bits. So, to make optimal utilization of number of characters in email ids, the characters added to the email id to indicate the secret data bits are taken...
Digital evidence stored on digital devices play an important role in a wide range of types of crime, including murder, computer intrusion, espionage, extortion and child pornography in proof of a fact about what did or did not happen. However, digital information is fragile because it can be easily modified, copied, stored or destroyed. All digital evidence will be analyzed to determine the type of...
Social media has been a new platform for emotion expression of individuals or groups in recent years. Millions of textual messages are constantly being generated. People with different emotion perceptions have different reactions to the same emotional event occurring in real life. However, it is hard to measure individual's emotion perception ability in both real world and social networks. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.