Learn More
Keywords: Reflective learning strategies Operational software Learning effectiveness Computer-assisted learning (CAL) ACT-R model a b s t r a c t Skill certification promotion is one of the main policies facilitated by the technological and vocational education, where application software instruction is regarded as the core curriculum to foster skill(More)
A completely automated public turing test to tell computer and human apart (CAPTCHA) is based on the Turing test, which aims to protect Internet services from automatic script attacks and spams. However, most proposed or deployed CAPTCHAs have been breached. It is possible to enhance the security of an existing CAPTCHA by adding noises systematically adding(More)
Ad hoc routing protocols are vulnerable due to the absence of security mechanisms, allowing attacks such as forged routing advertisements to disrupt the routing scheme. Research work has been proposed for securing the routing protocol in ad hoc networks; however, solutions that utilize asymmetric cryptographic primitives are often infeasible in a(More)
  • 1