The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
Lately, mobile device has become a convenient platform for augmented reality (AR). Day by days, mobile devices are getting popular as a platform for AR application such as a Smartphone. Mobile AR (MAR) is mainly available whenever people require an informational support for a focused task. However, only a limited number of researches are avalaible in the mobile augmented reality application. The objective...
The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation...
Because the phenomenon about unreasonable arrangement of college students' class hour is relatively common, the system designed a public colleges and universities ordering system based on WeChat. This system took use of convenience and openness of WeChat, which can tremendously simplify the development and promotion. At the same time, online ordering for the students provided a convenient way of eating,...
We provide texts generated by speech-to-text-recognition (STR) technology for non-native English speakers during lectures in English. We aim to test the feasibility of our approach. Our results show that participants who learned with STR-texts outperformed those who learned without them. Results also show no significant effect of STR-texts on post-test scores of the low and high ability participants...
This paper presents a concept for an e-Science oriented opportunistic cloud computing service with QoS assurances, as an infrastructure to offer to researchers computing resources with the flexibility and ease of use of a cloud computing service, supported through the opportunistic use of the idle computing resources available in academic institutions, with mechanisms in place to address the low reliability...
The increasing penetration of variable and uncertain generation from renewable resources poses a challenge for balancing the power system supply and demand. Violations of this constraint seriously impact system reliability and thus carry with them a very high cost. In order to address the issues created by variable generation increased system flexibility is required. System operators are considering...
In this paper we evaluate the impact that a Computer Supported Collaborative Marking (CSCM) system has on the marking process of a highly subjective judging task. To do so, we evaluated the inter-rater reliability of reviewers in charge of marking written essays and the time required to perform such task. We analyzed the results of two groups of markers: the experimental group first marked 5 essays...
We propose a method to improve the consistency of human evaluation of non-native speaker's utterance, with a capability to evaluate features such as accent and rhythm. In this method, human evaluators evaluate the accent and the rhythm independently by using average voice model and prosody substitution. We also investigated the advantages of evaluating those features independently. We found that,...
Dempster-Shafer evidence theory provides a useful computational scheme for integrating uncertain information from multiple sources. However, the combination result can be paradoxical when the evidences seriously conflict with each other. In this paper, we present an improved D-S algorithm which verifies the weights of conflicting evidences. Firstly, we calculate the distance between any two of the...
This paper compares the Information and Communication Technology (ICT) infrastructure between Saudi Arabia and Gulf States universities, the latter consisting of Qatar, Oman, United Arab Emirates (UAE) and Bahrain. A questionnaire, expert-reviewed and pilot-tested, was used to collect data from ten universities in Saudi Arabia and five in the Gulf States. It covered the perspectives offered by faculty...
Flash memory based solid state drives (SSDs) are widely adopted in mobile devices, PCs and data centers, making their reliability critical. Although periodically creating checkpoints is a well-developed technique for traditional hard disk drives, very few work has exploited the unique properties of SSDs to accelerate checkpoint creation and reduce storage cost. More specifically, the remap-on-write...
The early theoretical studies that presented conceptual definitions for the mapping of Quality of Experience (QoE) through Quality of Service (QoS), in an approach focused on Distributed Databases (DDBs), showed the directions to be threshed in a way to accomplish a hybrid DDBs' QoE-QoS set of evaluation criteria. That evaluation set being classified explicitly as partial, since QoE is a known multidimensional...
A non-orthogonal waveform superposition scheme for high reliable wireless communications is analyzed, and certain design rules for the scheme are discussed. The capacity of the scheme is superior than that of Nyquist signaling by use of waveform superposition and excess bandwidth. It's proved that the channel capacity can eventually reach the capacity of waveform channel, when the superposition multiplicity...
This paper discusses a composition problem of a resilient tree on a graph modeling a communication network whose links are intermittent. The resiliency of a tree is defined exploiting the binary relation on two kinds of edge weights: availability and commonality. Availability represents a probabilistic stability of a communication link corresponding to an edge, and commonality indicates the influence...
Modern challenges require new productions in the field of information security problems. Topical issues to be addressed. Formulate possible approaches for the removal of these issues on the basis of DLP-systems, biometric identification systems.
With the rapid development of technology, Internet has changed people's lives and online community has become a comprehensive platform for exchanging ideas and shopping. This study develops and tests an environmental psychology model of online impulse purchase. The model captures the moderating effect of search and experience product type on the relationship between the online impulse buying intention...
Cloud computing being promising and emerging technology for the next generation of IT applications which provides the storage and supports for outsourcing of data without having the native copy of data or files. Cloud computing service providers require a system which can handle a large number of requests at a time and is needed to be highly available. Major issue faces in cloud computing is Security...
Physically Unclonable functions (PUFs) is a new type of authenticating a device or chip such that it provides security with the inherent manufacturing variations. The purpose of this project is to implement a delay based Physical Unclonable Function (PUF) device on FPGA and test its performance. The implementation of the PUF logic is done using combinatorial logic. Here in this project, we implemented...
Services involving cloud computing are advertised by the providers such that they are available all the time; but many of the recent past events have shown how a single or a bunch of component seizures can lead to a system failure affecting the business continuity of consumers. Though reliability of a cloud system depends heavily on the capability of the participating components as a whole, but there...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.