The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While many virtual educational environments are already in use, few attempt to mix the virtual and the real worlds to a very high extent. The benefits of such approach could be groundbreaking, leading to new paradigms of education, however the complexity of the challenges and the scale of the effort are still very high. The "3D UPB" platform takes this approach of a fully mixed reality environment...
Even as the web 2.0 grows, e-mail continues to be one of the most used forms of communication in the Internet, being responsible for the generation of huge amounts of data. Spam traffic, for example, accounts for terabytes of data daily. It becomes necessary to create tools that are able to process these data efficiently, in large volumes, in order to understand their characteristics. Although mail...
To solve the contradiction between massive network information and limited learning needs, personalized recommendation service becomes the hotspot in research area. User characteristics analysis is the key point in personalized recommendation service. Based on the massive web access log in the web server, this research gradually puts forward the steps of user characteristics analysis which including...
In the recent past 3D and immersive technologies were not supported by standard business and educational computers. Yet new generations of Intel and AMD processors and improved networking provide a basis for the spread of immersive technologies, into all aspects of education, business and leisure. Consequently, it is critical that computer science and IT degree programs facilitate the graduation of...
As the Internet continues to establish itself as a utility, like power, transport or water, it becomes increasingly important to provide an engaging educational experience about its operation for students in related STEM disciplines such as Computer Science and Electrical Engineering. Routing is a core functionality of the global Internet. It can be used as an example of where theory meets practice,...
In this study, we developed a Multiple Skill Practice Management and results feedback System - sawing and planning. The system can be used for a beginner's vocational learning. Using this system, learners are able to meta-recognize their own skills without a teacher. This system consists of two parts; learners' motion sensing part by using smartphones, and store and visualization part of the data...
As a reliable, portable, and practical programming language, Java has been educated in many universities and professional schools. To assist Java educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS) to help students studying Java programming by themselves through automatic testing of Java source codes using the test-driven development (TDD) method. Unfortunately,...
Difficulties on Internet access due to low quality or unstable connections, have became a main obstacle to LMS use in remote places, especially in geographical challenged regions as is the case of the Amazon. In this paper we present a scheme for overcoming these problems that is based on: (i) the use of a local server that (a) bypasses all tasks among users and the main server when in normal access...
VoD (Video-on-Demand) has become a hot topic over the last few years. Research was conducted on reducing the bandwidth cost of it. Different from conventional schemes like batching and patching, pushing popular videos to users with external storage during off-peak periods gives a new perspective. In this paper, we propose a new scheme under a hierarchical network environment, named “PPVoD (Pre-Pushing...
Recently, Yang et al. Proposed a remote user authentication scheme using smart card. Through careful cryptanalysis, we find that Yang et al.'s scheme is not repairable, and cannot achieve mutual authentication and session key agreement. To overcome these security flaws, we propose a new remote user authentication scheme with smart card. In the proposed scheme, the user can choose his/her password...
It has become easier to create a lifelog by using smart phones. Lifelogs can be used in several ways. However, some problems exist in memory recollection; as many lifelogs owned by a person are partial information, it is impractical to remember days themselves. Therefore, a lifelog sharing system for memory recollection is proposed. The system elicits related information from other people's lifelogs...
A recent Pew research center study of mobile device usage revealed that, African American and Latinos are the most active users of the Internet from mobile devices. The study also revealed that minority cell phone owners take advantage of a much greater range of their phone's features compared with people of other ethnicities. At Winston Salem State University (WSSU), it is common for students to...
Building a cloud-based e-learning platform using the approach of the research field of learning analytics is the overall goal of this research study. With the strengths of a cloud service it is possible to add value to the learning process for all stakeholders. With such a solution, the process of collecting, analyzing and interpreting data becomes rather easily. This research study aims to introduce...
We describe the GENI Experiment Engine, a Distributed-Platform-as-a-Service facility designed to be implemented on a distributed testbed or infrastructure. The GEE is intended to provide rapid and convenient access to a distributed infrastructure for simple, easy-to-configure experiments and applications. Specifically, the design goal of the GEE is to permit experimenters and application writers to:...
The rapid pace of change being witnessed globally in the Information and Communication Technology sector as well as the skyrocketing costs in getting basic education needs met have forced many to seek for alternative ways of meeting these needs. Recent innovations in distance education opened up the pathway to new and dynamic ways of learning through Massively Open Online Courses (MOOCs) aimed at...
Checking remote data integrity in climacteric cloud computing infrastructure is a valuable matter of concern. As the idea of cloud computing entered into a wide implementation today, data access becomes a major security issue. One of the various privacy concerns that are possibly taken into consideration relates to the maintenance of cloud data integrity. Directing users to check data integrity under...
The method of inferring firewall policy, using Active Probing repeats the process of transmitting TCP/UDP/ICMP packets and receiving ICMP response packets. However, if ICMP response packets cannot be received normally, the accuracy of inferring the firewall policy decreases, and it is necessary to verify the feasibility in real conditions. In this paper, we collect Autonomous System (AS) information...
With the rapid development of the computer network, Internet provides powerful online service, thus forming multiple server environment, scholars have put forward multiserver authentication protocols, but there are some flaws in those protocols, in this paper, we analyze former multi-server authentication protocols based on dynamic identity, we study and design a novel identity authentication protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.