The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
file sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online. This brings new challenges to forensic investigations in detecting, retrieving and analysing the P2P applications. We investigate the characteristics of I2P network...
The knowledge resources available on the Internet are increasingly being used to support software both at development time and at execution time. These take the form of conventional services as well as human knowledge work both through crowd sourcing and information stored directly on the World Wide Web. But while these resources are vast and rich, they are also unreliable. In this paper, we propose...
Plagiarism is a serious problem identified amongst research community. Plagiarism has been around for centuries, but with the use of Internet and easy access to material in electronic format has made it easier to plagiarize materials of others. On the other hand plagiarism detection is now as easy as plagiarizing a document. There are a number of anti-plagiarism software available either freely or...
The reach of information is now much easier and effective in the age of information technology. Electronic documents and resources have changed the entire paradigm of education and research. Students, teachers, professionals, academicians and researchers may get their information on their desktop/laptop/Smartphone through electronic platform. The availability of Information and Communication Technology...
With the advent of Internet and new technologies variety of information sources are coming up. The thirst of information in R&D activities has become ever growing and ever demanding. The information is becoming more digital and people are getting easy access to abundant information which leads to the temptation of using and copying it and stealing other ideas without knowing the implications and...
To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy...
Jnana Edge provides a fundamentally different approach to bringing a knowledge experience, in a qualitatively rich, focused way to specific demographics. This is done through an interdisciplinary convergence of key technological advancements from scalable hierarchical system architectures, cloud computing, dynamic cache hierarchies, and distributed virtualization. Architecture and implementation considerations...
Web applications have become one of the fundamental Internet services. It is very necessary to support the popular browser-based web applications in Named Data Networking (NDN). The current Windows-based platform browser cannot directly access the NDN network. So we implement a browser which supports NDN-based web applications in the web browser kernel on windows. We use NewNDN.cpp which is an implementation...
Test beds such as GENI provide an ideal environment for experimenting with future internet architectures such as Choice Net. Unlike the narrow waist of the current Internet (IP), Choice Net encourages alternatives and competition at the network layer via an economic plane that allows users to choose and purchase precisely the services they need. In this paper we describe our experiences implementing...
Initiatives for library digitization in Kenya are scattered all over with the university libraries, showing greatest progression. Despite the Government supporting the implementation of ICT related changes in universities, the pace in digitization of libraries still remains slow and pervasive. One of the reasons for the slow pace is attributed to challenges faced in managing the implementation of...
Digital literacy is the ability to effectively and analytically navigate, evaluate and create information using a variety of digital technologies. It requires one to recognize that ability, to operate and transform digital media, to distribute it widely, and to easily adapt it to new forms. Digital literacy does not replace traditional forms of literacy, but builds upon the foundation of the traditional...
The real classroom conditions are very challenging for the teachers and administrators because of having the diversified students with and without special needs in an inclusive classroom. It seems like the different colours of flowers in a single flask. To tackle the individual differences and to maximize the educational achievement of the every student it becomes necessary to upgrade the educational...
Online human textual interaction often carries important emotional meanings inaccessible to computers. We propose an approach to textual emotion recognition in the context of computer-mediated communication. The proposed recognition approach works at the sentence level and uses the standard Ekman emotion classification. It is grounded in a refined keyword-spotting method that employs: a WordNet-based...
Croatian seventh grade elementary students should be completely qualified to independently browse their school library collection using its online library catalogue. Online library catalogues are an excellent example for a pupil to gradually and consciously use a computer in class to acquire information literacy skills, as described by Mike Eisenberg and Bob Berkowitz in their Big6 model. The results...
In recent years, a large body of research has been dedicated to the 'lightweight' implementation of Elliptic Curve Cryptography (ECC) for RFID tags, wireless sensor nodes, and other 'smart' devices that are supposed to become components of the Internet of Things (IoT). However, making ECC suitable for the IoT is far from trivial since many applications demand fast response times (i.e. high performance),...
The work presents an account of the history of computerization of the Brazilian academic libraries under the particular history of the Universidade Federal do Rio de Janeiro libraries, since 1968 until today. Discusses the systems developed and used by libraries over the years and their changes. Recounts the experiences lived by integrated teams of analysts and librarians, the growing need for modernization...
The multidisciplinary practices of Precision Agriculture (PA) which use embedded electronic and remote sensing in agricultural machinery has demanded researches of sensors and communication networks for data acquisition and control in the farm field. The CAN-Based Distributed Control System (DCS) according to ISO 11783 (or ISOBUS) standard provides the interconnection of electronic devices embedded...
Applications based on SaaS platform have been appeared as services for common users and enterprise users and an integration management of literature contents of libraries in the country is needed in the future. SaaS based literature contents integration has not been done here yet. Therefore, this paper presents SaaS based technology which integrates literature contents of public organizations or libraries...
The network education resource sharing is an important aspect in the higher education information technology construction. At present, the integration of universities institutes makes the network education resources development and application of the secondary institute extremely uneven. Grids are the use of technology to allow distributed resources to be effectively shared across diverse collaborations...
Module programmer inherits and develops the Object Oriented programmer. It makes use of object technology in system design and makes further abstract of the realize process of Object Oriented programmer. Using of modules decreases repeated work, advances modularize, customization and expansibility of system. In this paper, professional software was introduced to design graphic elements which then...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.