Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Hybrid broadcast-broadband TV (HbbTV) is a global initiative that brings new solutions to world of digital television (DTV) in terms of entertainment. In comparison to previous initiatives, different services are additionally provided in HbbTV. This paper describes an application for displaying of hybrid Electronic Program Guide (EPG) for a digital TV receiver. The application works with and without...
In this paper, the significance role of data warehouse designing for textual anti-plagiarism system is investigated. The paper covers the central issues of data warehousing modeling including: (1) formulating the data representation, (2) establishing the foundations of storage structure, (3) proposing corresponding architecture allowing to store, update and manage data. Consequently, two levels are...
Within the context of the ISO/IEEE 11073 family of standards for point-of-care (PoC) medical device communication, a communication protocol specification for a distributed system of PoC medical devices and medical IT systems that need to exchange data, or safely control networked PoC medical devices by profiling Web Service specifications, is defined by this standard. Additional Web Service specifications...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
Recent advances in technology have allowed the development of laboratory experiments that do not require the physical presence of a student in a physical laboratory. These experiments are conducted using the internet, using simulation, or actual control and monitoring of real equipment located remotely, or a hybrid of both. This allows potential sharing of resources that could result in reduction...
There are a large number of educational resources available on the Internet through different repositories. However, authenticity methods of learning objects has not been widely adopted by repositories, making it difficult to verify the authors of the content. To solve this problem, our goal is to aid users and authors of learning objects to have a trusted verification of authenticity and versioning...
The implementation of devices or sensors developed over open source electronic platforms is a very important key of the projects aiming for promoting concepts such as Internet of things and Smart Cities. Due to the heterogeneity of these projects and especially the lack of a standard to regulate the communication process between the sensors and the application server, taking into account that many...
In this study, a new academic event recommendation method is proposed. This method analyzes author interactions, academic event attendance records, research related, and textual descriptions from attended academic events to measure interaction strength between authors. Experiments on the DBLP dataset and Wiki Calls for Papers (WikiCFP) showed that the proposed method is helpful in improving the accuracy...
We developed a teleoperated robot arm system using the Robot Service Network Protocol (RSNP). RSNP is a standard communication protocol for service robots. In order to establish a common teleoperated robot system, we investigated the application of RSNP to our teleoperated robot and newly applied the RSNP to the robot's arm control. Performing precise tasks with a robot arm is usually difficult because...
In the face of the situation that the network information is constantly increasing and updating, RSS provides a way to realize information sharing in the Internet age. For the technology of pushing information in RSS, which can dynamically aggregate multi-source information, provide personal service and efficient information, this paper puts forward the application of pushing technology to the field...
Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching...
Contemporary devices for playing of video and audio signal from DVB bitstreams use complex hardware structure due to high requirements specified by standards like Hybrid Broadcast Broadband TV (HbbTV). The main focus of this paper is the proposal of a software that runs on set-top boxes (STBs). Instructions and attributes for STBs are contained in Extensible Markup Language (XML) and therefore XML...
This paper presents an Internet based SCADA platform for monitoring the structures of a hydropower plant. The remote monitoring system communicates through TCP/IP sockets with the embedded gateway module interfacing the sensor network, facilitating configuration of the sensors, acquisition and archiving of the measurements, visualization of the data in real-time or of the archived data, as well as...
The problem of content change tracking on the web had various applications starting with human operators or software tools monitoring a web resource. The problem becomes more complicated if the human operator or the software tool needs to monitor changes in a particular area of the web resource. This article proposes a solution for tracking changes in Internet data sources focusing on using low storage...
Steganography is helping individual to send confidential data between two parties. It enables user to hide data in different digital mediums. Steganography is of many types such as image steganography, text steganography, audio/video steganography etc. Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily. Some of...
One of the core skills that Computer Science undergraduates master is to create finite automata and regular expressions from natural-language descriptions of formal languages. It is quite common for such descriptions to be ambiguous (or appear to be so), particularly when instructors or students are not fluent in the natural language. Two questions arise: (1) Can an instructor unambiguously convey...
This paper presents a design, implementation and evaluation of a web-based application called MergeXML (MXML). MXML was developed to integrate XML documents that are similar in terms of structure and content to complete information which can be used for information retrieval. XML documents are clustered into subtrees representing as instances using leaf-node parents as clustering points. The system...
The vast amounts of data generated in near real-time due to prolific use of sensors, pervasive usage of mobile Internet, and popularity of social media platforms, necessitates the efficient dissemination of the semi-structured streaming data to the consuming applications. Towards this end, we introduce the subscriber-centric XML filtering approach for seamless and efficient XML stream replication/distribution...
When hackers try to attack a target system, their first goal is to install a malware to the target system. It is because hackers can do anything what they want if a malware is installed. In the past, most of the malwares were Microsoft PE files, however they have been changed to various file formats such as pdf, jpg, doc, jar and so on. Under this circumstances some network security systems such as...
Quality analysis is one of the key step to be followed while developing any software or product. While doing research, data being collected is all depends on the way it is collected. In market and research industries data quality is primary factor for research analysis. In this paper, we have developed a parser that will help in quality check of online surveys created in tool named as Qualtrics. In...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.