The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the possibility of hidden data. Since today all network services rely on the basic protocols, the use of data transmission capacities are not taken into account, untestable and redundant fields may become a big problem. All of the modern data protocols have vulnerabilities. An attacker can use the reserved fields or field use undocumented way. Regarding the mechanism of...
In this paper, the innovative approach to extraction of the real size of the human body is presented. The prototype device for such extraction process is designed, implemented and tested on larger sample of subjects. The principal goal is the proposal of a solution for creation of exact skeletal human body model. Model dimensions may be further used in numerous use-cases, such as 3D modelling, clothing...
Modern IT companies are experiencing high employee fluctuations during last years which cause lots of financial costs due to an initial adaptation periods for new employees. Considering mainly fresh graduate employees and employees which don't have enough initial knowledge to perform according various internal rules, causes their disorientation in the company processes and thus slower their professional...
In this paper the real size of the object from a static digital image is estimated. The analysis of selected algorithms used in the area of computer vision is carried out, this includes introduction of the software tools efficient enough to measure the object size. Proposed solution has to be in compliance with the conditions for correct processing of obtained information, such as a suitable scene...
In this paper the model for real-time monitoring of selected premises is presented and implemented as a web based interactive interface while utilizing open-source hardware. The rudimentary idea is based on the capabilities offered by contemporary web technology which enables the development of complex and interactive solutions — essential for our purpose is HTML5 and JavaScript technology. Approach...
Many interesting conferences are organized in similar fields but during years the series of the ICETA conferences have gradually built a good international reputation and has got a dignified place in the ICT world.
This paper deals with the networking academy implementation in Slovakia, compares the currently available solutions in content delivery and highlights available features of Cisco NetSpace. Besides of the general overview, site goal of this paper is also to share experience in building collaborative environment in order to support collaboration.
In the recent years there are more and more mobile devices appearing which are running Android operating system. Nowadays there is a trend of information availability anytime and anywhere. Main goal of this paper is to present the solution for interconnection of mobile device application environment and universal programmable microcontroller based on ARDUINO board with the goal of monitoring and remote...
Goal of this paper is to overview the structure of the Networking Academy program as well as to identify emerging technologies which are supporting the NetAcad program even in content delivery or support of the institutions which are responsible for the content delivery. Besides of the general overview we are sharing best practice in creating collaborative environment.
This paper presents new concept for object tracking system with multiple cameras. Concept contains analysis, comparison and design of interconnection between various systems, including streaming, detection and tracking technologies in the multi-camera environment. The main goal is to develop object tracking system and do stream selection with best object presentation. Multiple cameras are used as...
In the paper we present a method for anomaly detection in user's activities utilizing data from unobtrusive sensors. A service for a smart-home environment using this method adapts to behaviour of a user and may provide alarms to a carer or other responsible person if unusual activity is detected. As an unusual activity we consider: long periods of inactivity, lacking activity, unusual presence and...
After years of gathered experiences related to learning management systems we realize that integration of business intelligence and knowledge is one of the main reasons of success. Many LMS are let's say open minded sources of information in some cases partly organized. Not so many of themes are managing students into groups, taking care of attendance, notifying students or creating social community...
The concept of Reverse Engineering is used in many fields of IT every day, to name just a few: legacy compatibility, binary code patching, malware analysis, network protocols analysis, debugging or even rapid prototyping. Despite its broad use, reverse engineering is not actively taught as a part of computer science courses. This paper tries to provide a survey of some of the real life usage scenarios...
Increasing requirements on video quality seem to be essential while designing any video-oriented services. The methods in the user-centered design of services are fairly labor intensive and have to consider resulting value of user experience. However, user experience is a term that is currently very hard to be defined. There are different approaches to user experience assessment, which lack an ultimate...
IT industrial certifications have become successful response to the extremely fast and constant changes in the industry of information and communication technologies. The certifications are widely accepted within the industry as industry standards for assessment of particular technical skills and knowledge. Speaking of local conditions in Slovakia, concept of industrial certification needs to put...
This paper is aiming at sharing a good practice on how to use ICT to create new value for learning. 21st century jobs require 21st century skills. The author present the example of an innovative learning environment - the Cisco Networking Academy model - which over the past fourtheenn years proved to be successful worldwide and resulted in continuous growth of participating students and teachers,...
This paper is dedicated to the issues related to the system of career promotion of professionals in the field of computer networks based on industrial certificates. The EU member countries face a serious shortage of professionals in development and care of information and communication technologies. It is expected that by 2008 the EU countries could be short of as many as 22 thousand professionals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.