Wi-Fi Security Using WEKA

2020 ◽  
Vol 8 (3) ◽  
pp. 01-07
Author(s):  
Khaing Khaing Wai

Wi-Fi is a vital piece of day by day life. Billions of people the world over depend upon Wi-Fi in their homes and organizations, to shop, bank, facilitate life, and remain related. Wireless connectivity devices, for example, phones, Laptops and PCs are by and large progressively utilized by University students to get to learning assets nearby systems and the Internet. Most of the phones offer security shows for relationship with a Wi-Fi router. This paper presents a layout of Wi-Fi security and suggestions as indicated by Wi-Fi organization.

2021 ◽  
Vol 12 (3) ◽  
pp. 1609-1617
Author(s):  
Nor Hazlyna, H Et.al

The origin of COVID-19 was found in December 2019 from Wuhan, Hubei Province, China; and it has spread very fast all around the world. It is a worrying disease as many positive cases are reported increasing day by day. The emerging of COVID-19 outbreak requires social distance and other interventions to protect human and environmental health. The objective of this study is to promote awareness among public university students on the importance of hygiene during the pandemic of COVID-19. Therefore, a study was carried out to assess the hygiene awareness among public university students during this outbreak. A cross-sectional study was conducted using an online survey method among public university students. The study generally is aimed to determine COVID-19 awareness, attitudes, knowledge, and related behaviours among the students. The results show that most of the students are aware of the current issues of COVID-19, and at the same time they practice good self-hygiene to prevent themselves from getting infected. However, there is still room for the university students to improve their hygiene awareness, and exercising more complete precautionary matters to prevent the spread of COVID-19.


Author(s):  
Zoe Andrea Rilloraza ◽  
Juan Carlos Abad ◽  
Khyle Angeline Cabilan ◽  
Lorry John Cervantes ◽  
Ruflyle Fontanilla ◽  
...  

Media piracy is slowly increasing its popularity, on the Internet, in the market, schools and the community. Day by day, millions of information is either being downloaded or uploaded to or from the Internet and making media piracy a lot more popular than it is already. Enjoying the comfort of their beds and by just clicking, pirates have already earned thousands in just a minute, which attracts people to join the pack. There is no doubt that media piracy could take over the world because in just over three decades it became a global matter. It became a monster of society. This study is all about The Image of Modern Filipino Pirates: Dimensions and Implications on Media Piracy. This study was conducted in Lorma Colleges Special Science High School and its respondents were 3rd year and 4th-year students and the Faculty of LCSSHS. This study focused on the following theories such as Rational Choice Theory, Social Learning Theory and Self-Control Theory.


Author(s):  
Hakan Usakli

The aim of the article is to analyze inter- relations between online shopping behaviour and personality traits. Online shopping has been developing all over the world. People not only buy locally but also trade internationally via the internet. The method of the study is correlation with the use of SPSS programme. Two different inventories were administrated to 243 university students via online. Big-Five Personality Questionnaire and Compulsive Online Shopping Behaviour were used. This test apparatus indicates five different personality dimensions such as extraversion, agreeableness, conscientiousness, emotional stability, intellect imagination. The compulsive online shopping behaviour was applied to get data on online shopping. The findings indicate that there are correlations between personality traits and excessive online shopping behaviour. People who are less agreeable and self conscious should think more before shopping online.


2021 ◽  
Vol 15 (02) ◽  
pp. 19-24
Author(s):  
Vishv Patel ◽  
Devansh Shah ◽  
Nishant Doshi

The large deployment of the Internet of Things (IoT) is empowering Smart City tasks and activities everywhere throughout the world. Items utilized in day-by-day life are outfitted with IoT devices and sensors to make them interconnected and connected with the internet. Internet of Things (IoT) is a vital piece of a smart city that tremendously impact on all the city sectors, for example, governance, healthcare, mobility, pollution, and transportation. This all connected IoT devices will make the cities smart. As different smart city activities and undertakings have been propelled in recent times, we have seen the benefits as well as the risks. This paper depicts the primary challenges and weaknesses of applying IoT innovations dependent on smart city standards. Moreover, this paper points the outline of the technologies and applications of the smart cities.


Author(s):  
Yash Gupta ◽  
Shaila Agrawal ◽  
Susmit Sengupta ◽  
Aruna Chakraborty

As the significance of the internet is increasing day by day so is the need of protecting the media over the internet. In order to protect the copyright information of the media over the internet, the authors use the technique of watermarking. Watermarking is the process of embedding a watermark in the media and then extracting it for ownership verification. Different types of watermarking schemes exist in the world, but we always look for techniques which are highly imperceptible and do not lead to loss of fidelity. Here the researchers have put forward a technique that instills different watermarking schemes to different sets of frames.


2021 ◽  
Vol 60 (1) ◽  
pp. 61-76
Author(s):  
Associate Professor Hussein Ahmad Al-Rimmawi ◽  
Lecturer Mahmoud Ahmad Abdel-Fattah ◽  
Lecturer Yusra Othman

Since the spread of internet, communications in every part of the world have become easier and faster. This paper is intended to find out the world wide spatial extension of Birzeit University (Palestine) Students internet contacts through a questionnaire that was designed and distributed to a selected random sample of Birzeit University students for this purpose. Spatial distributions of communicated countries by Birzeit University students were mapped and analyzed. In addition, languages used, topics and images exchanged were tackled. Frequency of internet uses was also analyzed in addition to students’ attitudes, intentions and behavior toward internet communications. In this study descriptive statistics, and correlation analysis using Fishbein, and Ajzen behavioral model were used. Finally, results of the study were reported to shed light on positive and negative outcomes of internet communications.


2019 ◽  
pp. 25-28
Author(s):  
Tomohiro Yokoyama ◽  
Hiroshi Bando

Background: In the field of psychology and psychosomatic medicine, Transactional Analysis (TA) was and developed by Berne and Dusey. Consecutively, egogram analysis has been prevalent by 5 egos including Critical Parent (CP), Nurturing Parent (NP), Adult (A), Free Child (FC) and Adapted Child (AC). In Japan, Tokyo University Egogram (TEG) has been used, and authors have continued egogram research for long. Methods and Results: Subjects were 502 university students. They answered TEG questionnaire with the evaluation of the personality trait. Out of 29 personality pattern, 6 types were more than standard data. They are dependent, short-tempered, self-centered, conflict, solitude and pessimist types. During 10 years of our research, self-centered and solitude have been increasing, and good-hearted and playboy types have been decreasing. Discussion: From current data, several tendency would be speculated: Lower NP seems to be a characteristic for modern university students. It may be related with a noticeable decline in overall morality among younger generations in Japan. Furthermore, the prevalence of internet in the world may influence of the behavior of young people. Not actual experience but information on the internet can make them refrain from active human relations to others. These results would be expected to become useful reference data.


Author(s):  
Yash Gupta ◽  
Shaila Agrawal ◽  
Susmit Sengupta ◽  
Aruna Chakraborty

As the significance of the internet is increasing day by day so is the need of protecting the media over the internet. So in order to protect the copyright information of the media over the internet we use the technique of Watermarking. Watermarking is the process of embedding a watermark in the media and then extracting it for ownership verification. Different types of watermarking schemes exist in the world but we always look for techniques which are highly imperceptible and does not lead to loss of fidelity. Here the researchers have put forward a technique which instills different watermarking schemes to different set of frames.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2011 ◽  
Vol 23 (4) ◽  
pp. 186-191 ◽  
Author(s):  
Malini Ratnasingam ◽  
Lee Ellis

Background. Nearly all of the research on sex differences in mass media utilization has been based on samples from the United States and a few other Western countries. Aim. The present study examines sex differences in mass media utilization in four Asian countries (Japan, Malaysia, South Korea, and Singapore). Methods. College students self-reported the frequency with which they accessed the following five mass media outlets: television dramas, televised news and documentaries, music, newspapers and magazines, and the Internet. Results. Two significant sex differences were found when participants from the four countries were considered as a whole: Women watched television dramas more than did men; and in Japan, female students listened to music more than did their male counterparts. Limitations. A wider array of mass media outlets could have been explored. Conclusions. Findings were largely consistent with results from studies conducted elsewhere in the world, particularly regarding sex differences in television drama viewing. A neurohormonal evolutionary explanation is offered for the basic findings.


Sign in / Sign up

Export Citation Format

Share Document