The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve...
Information and communication technology (ICT) in education has become the strategies of all countries and economies around the world to achieve enriching human resources and rapidly developing economy and society. The purpose of the ICT in education is to cultivate innovative talents and implement the modernization of education. This paper utilizes the assessment results and questionnaire data of...
First-year engineering students enter our university with differing experiences using computers and technology. This affects the classroom dynamic especially with large differences between students. With this in mind, faculty must address the following questions when planning their course: Where should the faculty focus their time? Do they focus on bringing everyone to a specific level? Do they teach...
Firewall is a standard security utility within the Microsoft Windows operating system. Most Windows users adopt it as the default security option due to its free availability. Moreover, Windows Firewall is a widely used security tool because of the large market share of the Microsoft Windows operating system. It can be customised for filtering of network traffic based on user-defined inbound and outbound...
IoT based traffic congestion control unit design increases the service efficiency of the police personnel. Careful investigation is done to develop a work flow process for a real time traffic monitoring unit. Enhanced functionality in the design is provided using multitasking design capability in term design of both. Sensing traffic and alert service providing unit. A knowledge eco system is developed...
While playing the communication game “Are You a Werewolf”, a player always guesses other players' roles through discussions, based on one's own role and other players' crucial utterances. The underlying goal of this paper is to construct an agent that can analyze the participating players' utterances and play the werewolf game as if it is a human. For the first step of this underlying goal, given...
Laboratory education is very important and plays a vital role in science and engineering courses. The cost needed for the setting up of a good laboratory can be huge and expensive to institutes that are heavily resource constrained. The rapid development of information and communication technologies, on the other hand, has had a remarkable change in the education system. This paper provides a comprehensive...
In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et al already developed Bit Level Encryption Standard ver-1, 2, 3, Bit level Multi way Feedback encryption standard. Recently Nath et al also developed 2-dimensional and 3-dimensional multiway feedback encryption standard. In the present...
The current research aimed at revealing E-learning dimensions and subjects which should be used for determining E-learning efficiencies faculty of education teacher students should own, and therefore it aimed to explore the effectiveness of Education college programs in Al-Aqsa University. For fulfilling the research objectives, the researchers utilized the descriptive analytical method, analyzing...
Software-defined networking (SDN) has emerged as one of the future internet technologies. It separates the control plane and the data plane, keeping the data plane simple by assigning the complex computing to the control plane. Active queue management (AQM) has been researched to obtain lower delay and higher throughput. It is noteworthy to have these advantages in SDN. To bring AQM to SDN without...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly dynamic, and largely opaque eco-system of networks the Internet is. Currently, only two practical solutions are available: (i) equipping packets with the Record Route IP option to register addresses of the traversed routers; (ii) eliciting ICMP Time Exceeded messages by limiting the Time-to-Live of...
The purpose of this research was to identify the students' level of utilization of Learning Management System (LMS) namely, i-Class at University Teknologi MARA (UiTM) Malaysia. The researcher examined four factors which are the students' technology competency, students' access to i-Class, lecturers' initiative, and students' perceive usefulness towards the students' utilization of i-Class. The research...
Internet of Things is the third wave of global information industry following computer, the Internet and mobile communication network. The International Telecommunication Union proposes four key application technologies of IoT: RFID technology, sensor technology, smart technology and Nano technology. RFID technology, which is short for radio frequency identification, is introduced in this paper. The...
Over current long fat networks, enough throughput cannot be obtained using TCP Reno, which is the classical standard TCP congestion avoidance algorithm. For this reason, many high performance TCPs have been proposed, such as Compound TCP and CUBIC TCP. Then, these proposals have caused a new issue, which is fairness among these modern TCPs. For this issue, several fairness evaluations and some proposals...
With the rapid growth of network technologies, Web-based learning conquers the limits of time and location in traditional teaching and is increasing its popularity. However, most of the learning websites lacks of the convenient tools in packaging the information users are interested in. Therefore, the information posted and exchanged in the websites is not easy to be extracted and reused somewhere...
This paper proposes the standard specification of metric numbers and is intended to discuss the topic. The numbers combined with metric prefixes like the 2k for the year, or 2k2 for resistors inscription are popularly used. However, there exists no standard to guide the use of such numbers, and typical precision is limited to few digits, as in the E24 series used for electronic parts. Computational...
If everything had gone according to plan, the Internet as we know it would never have sprung up. That plan, devised 35 years ago, instead would have created a comprehensive set of standards for computer networks called Open Systems Interconnection, or OSI. Its architects were a dedicated group of computer industry representatives in the United Kingdom, France, and the United States who envisioned...
Internet standards development requires consideration of security issues in the protocols. But what does “security” mean in this context? We often conflate several different aspects into the blanket term “security.” Here, the author looks at some of these aspects separately.
Standardization has been recognized as an important step for technology adoption in recent years. As it increases its position in the process of technology adoption, it has become clear that standardization must be manipulated in a systematic manner. Research on the process of standardization is still in its early stages because standardization takes a long time to implement. Context dependency in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.