Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we...
The Internet is dramatically evolving and creating various connectivity methodologies. The Internet of Things (IoT) is one of these methodologies which transform current Internet communication to Machine-to-Machine (M2M) basis. The IoT can seamlessly connect the real world and cyberspace via physical objects that are embeded with various types of intelligent sensors. The opportunistic networks are...
The Content Centric Networks (CCN) replaces the IP narrow waist of the Internet architecture by a content layer. When a node wants to access a piece of content, it sends an Interest packet to the network. The network then, using the name of the content for routing, forwards the Interest to one or more copies of the content object. In this paper, we present the implementation of a OpenWRT OS based...
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect or identify the bad...
The increasing development of health social networks (HSN) in recent years has led the fast growing of user-generated contents. People tend to interact and share health information in social networks. However, the trustworthiness of information is the major concern in shared health information in social networks. Viral rumor-spreading that can happen quite rapidly in social media can cause damages...
In this paper, we present the experimental results and evaluation of the Smart Box stimulation device for medical applications using a P2P system which is based on JXTA-Overlay. The Smart Box is integrated with our P2P system as a useful tool for monitoring and controlling patients activities. We found by experimental results that by Smart Box we can check the patient's situation. We carried out experiments...
The design of an efficient collaborative multirobot framework that ensures the autonomy and the individual requirements of the involved robots is a very challenging task. This requires designing an efficient platform for inter-robot communication. P2P is a good approach to achieve this goal. P2P aims at making the communication ubiquitous thereby crossing the communication boundary and has many attractive...
In this paper, we present the experimental results and evaluation of the Smart Box stimulation device for e-learning and medical applications in a P2P system which is based on JXTA-Overlay. The Smart Box is integrated with our P2P system as a useful tool for monitoring and controlling learners or patients activities. We found by experimental results that by Smart Box we can increase the learner's...
The importance of mobility in networks is being increased together with its number of users and applications. However, we still do not have broadly accepted solutions for mobility in Internet or other type of networks. In particular, mobility is difficult in heterogeneous networks, where heterogeneity could expand over ownership, administration, technology, and so on. We propose for such heterogeneous...
Spatial and temporal variations in network bandwidth constraints constitute serious challenges to the multicast distribution of real-time video content. We present a video multicast algorithm that combines multi-layered video encoding with feedback-based source adaptation in order to address varying bandwidth constraints in a multicast tree. The proposed algorithm uses a novel multicast flow control...
User modelling in on-line distance learning is an important research field focusing on two important aspects: describing and predicting students' actions and intentions as well as adapting the learning process to students' features, habits, preferences, and so on. The aim is to greatly stimulate and improve the learning experience. Indeed, on the one hand, students' intentions may change during the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.