The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this research study, our major interest is to test the significant association between selected variables which otherwise invisible. These variables have indirect impact on performance of students. We have devised out our own dataset for the experimental purpose. Our study has made these variables and their relationship visible. The results enable us to determine characteristics of learning environment...
Electronic devices can be seen everywhere in our lives along with the popularization and application of computer technology, meanwhile more and more digital traces are found in criminal activities, so we can take these digital evidences to prove case. But digital evidences usually have been questioned in the courts because of their reliability. There is no valid method to prove the reliability of...
In this paper we will present a case study and an analysis conducted to evaluate the use of lecture learning as a helpful companion to the classical teaching. This effort is done around the Opencast Matterhorn software, a system that is able to record classroom presentations and publish them on a LMS automatically, without the intervention of a technician dedicated to it. So we delivered a university-wide...
The teaching materials used by Taiwanese students in class are compiled by different publishers according to the curriculum outline established by the Ministry of Education. However, limited by the layout of teaching materials, it is impossible to incorporate all knowledge referred by the curriculum outline into teaching materials, thus, some are selected and some are abandoned. For example, as the...
This paper puts forward the basic computer teaching practice by carrying out professional integration and the enhancement of computational science thinking ability. Since 2007 the teaching system has been applied extensively in a number of universities. Feasibility and validity of the system are proven. The practice has demonstrated that it is an effective way to promote the students' ability of computer...
Presence or feel being located in virtual environment can make the Virtual Reality application more effective. One type of Virtual Reality application is Image-based Virtual Reality application; which defined as the panoramic virtual environment that mimic the real environment which users can interact with. Due to the limited interaction function, none research exists between Image-based Virtual Reality...
The use of educational software in teaching and learning Science, Mathematics and English are encouraged among teachers. The Ministry of Education (MOE) has provided teachers with a variety of software to achieve the objectives and goals of teaching and learning Science, Mathematics and English and also helped students to master Mathematics and Science concepts easily. The purpose of this study was...
The rapid development in information technology has enabled students to learn computer in different levels of education, however problems arose not only in students' computer learning, but in the course connection between computer courses in secondary and tertiary education. This paper reports on results of comparisons, survey and interviews relating to computer education in different educational...
The importance of ballistic applications has been recently recognized due to the increasing crime and terrorism threats and incidents around the world. Ballistic image analysis is one of the application areas which requires immediate response with high precision from large databases. Here, the microscopic markings on cartridge case of a bullet obtained in a crime scene are compared with that of images...
We conducted a quasi-experiment through an online survey to investigate the effects of information security knowledge on users' adoption of security technologies. We found that knowledge can affect adoption decision in multiple ways. On the one hand, knowledge tends to increase a user's self-efficacy in using the technology, which in turn increases the perceived usefulness of the technology, consistent...
In this paper, a novel Bot detection algorithm for Windows system based on API call correlation was proposed. the coefficient of product-moment correlation was utilized to calculate the correlation of different API calls. More other activities were correlated as well as keylogging. According to the characteristics of different Bot activities with API calls, the membership of different activities were...
In this paper, we present a game-based tutoring system with learning performance, to assist Taiwanese students learning English. Based on the programmed instruction, a speech recognition game for eco-pond context is applied as content for English learning, in which learners take lessons in English from chapters of biological food chain and biological evolution. Also, learners can interact with organisms...
The infusion of computer-based learning into teaching and learning has altered considerably the instructional strategy in our educational institutions and changed the teaching and learning approach. When learning a network design, one must follow it with practical methods. However, to do the practical and get involve with the real network devices result in a higher cost spending, which make practical...
As a kind of invisible spyware that records user's keystrokes, software keyloggers have posed a great threat to user privacy and security. It is difficult to detect keyloggers because they run in a hidden mode. In this paper, an immune-inspired dendritic cell algorithm (DCA) was used to detect the existence of keyloggers on an infected host machine. The basis of the detection is facilitated through...
Few studies on the factors affecting use of information and communication technology (ICTs) in various sectors in developing countries have been done. And yet, with the increasing pervasiveness of mobile computing devices and other ICTs in developing countries, much hope is being placed on these technologies to lift socio-economic development in these countries from the doldrums. This paper, investigates...
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to...
The traditional method based on "support-confidence" framework could bring a large number of irrelevant or even misleading association rules. In view of the problem of evaluation standards of association rules, we increase interest measure in the evaluation standards, and give the definition of interest measure and positive and negative association rules method based on "interest-support-confidence"...
The Chinese Very Long Baseline Interferometry (VLBI) network (CVN) is a synthetic aperture radio telescope with the equivalent diameter up to 3000 Km. This telescope aims to astronomy observations and deep space explorations. The correlator is the kernel data processor, and its operation is both data intensive and computation intensive. This paper presents the structures of two CVN software correlators...
In order to teach college freshmen more conveniently, we have formulated a questionnaire to investigate the computer basic knowledge they had got in secondary schools. This paper measures and analyzes the reliability and validity of that questionnaire by the technology of education measurement. The result indicates that the questionnaire has a good internal consistency; and its distinction validity,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.