The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As two important concepts of relationship marketing, brand relationship and relationship benefits have received more and more attention by marketing scholars. Previous research focused on relationship based on personal relationship and the outcomes of relationship benefits. This paper investigated the relationship among brand personality, consumer personality traits and their perception of relationship...
The Islamic websites play an important role in disseminating Islamic knowledge and information about Islamic ruling. Their number and the content they provide is continuously increasing which require in-depth investigations in content evaluation automation. In this paper, we are proposing the use of conceptual reasoning for detecting inconsistencies in case of Fatwas evaluation. Inconsistencies are...
Nowadays, more and more people are using Information and Communication Technologies (ICTs) in order to accommodate their daily needs. E-Government (e-Gov) adopts these technologies in an effort to provide prompt and secure services to citizens. However, the intention to use e-Government services has not yet been fully examined by the international literature. The present research attempts to bridge...
While the importance of protecting the confidentiality of sensitive cybernetic communications is widely recognized, the importance of ensuring the trustworthiness of information that is public yet critical is perhaps less obvious. Critical non-confidential messages must be issued by a trusted authoritative source in order to serve as the basis for operational decisions, but while existing authentication...
To account for the problems of long delay, large loss, low SNR and no feedback information in IPN (InterPlaNetary Internet) backbone network, we proposed multihop relay protocols based on fountain codes. The rateless property, erasure property and no need feedback of fountain codes, which combined the advantage of relay make us propose the Random Linear Network Coding (RLNC) based and LT code based...
Over the last decade, Delay-Tolerant Networking (DTN) has evolved from a new idea to a set of ready-to-use specifications and implementations. Substantial research and development efforts have been devoted to enabling new forms of communication via these solutions in contexts not addressed by earlier communication approaches. A few years ago, the Ring Road concept has been proposed as a potential...
This paper evaluates and compares the performance of various transport protocols over some current tactical radios using different topologies. The four selected transport protocols were TCP, SCTP, UDT, and Mockets. The comparison was done with three different tactically relevant radios - the Harris PRC-117G, the TrellisWare TW-400, and the Persistent Systems WaveRelay MPU4. The results show a surprising...
We present the framework for a heterogeneous internetworking service architecture to provide probabilistic quality of service guarantees to short critical messages prior to transmission. The TCP/IP Internet is not suited to bear mission-critical data across administrative domain boundaries with stringent delivery requirements because Border Gateway Protocol obscures network state information. Critical...
Traditional Relation Extraction (RE) trains individual extractors for pre-defined relations. Open Relation Extraction (ORE) can eschew domain-specific training data, tackle an unbounded number of relations, and scale up to massive and heterogeneous corpus such as the web. However, It is difficult to process micro log texts: the genre is noisy, utterances are very short, and texts have little context...
User vigilance and security awareness are two interrelated factors, which we often oversee and merely rely on the default configurations set by the related vendor. User-related mistakes can lead to serious threats to computerized systems. If not performed adequately, system maintenance tasks including backup, restore, patch, upgrade, and malconfigurations can create critical vulnerabilities throughout...
This research investigated the effects of using WebQuest on developing first year secondary students' reading comprehension skills and cultural awareness in an experimental school in Egypt. 31 students was selected at random and assigned to an experimental group. One form of a reading comprehension test and a cultural awareness test were administered to the students as pre-and post-tests. Statistical...
Internet connectivity in most rural African areas has been viewed as a major challenge due to lack of reliable power, scarcity of network expertise and expensive installation of network equipment. With the rapid development of wireless technologies, Wireless Mesh Network (WMN) has emerged as a promising networking infrastructure, bridging the digital divide between the urban and rural areas. However,...
Internet of Things is the convergence of computing, Internet and mobile communication networks resulted by the development of third wave of information technology industry. This paper presents a study by first introducing the basic concepts and features of Internet of Things (IoT) followed by the introduction of the ubiquitous sensor networks (USN) architecture. A simplified model of the USN is also...
This paper presents a method of acquiring IsA assertions (hyponymy relations), AtLocation assertions (informing of location of objects) and Located Near assertions (informing of neigh boring locations) automatically from Japanese Wikipedia XML dump files. To extract IsA assertions, we use the Hyponymy extraction tool v1.0, which analyses definition, category and hierarchy structures of Wikipedia articles...
Web portal's capability in information quality (IQ) will determine its success; especially in complying with user's need. On Indonesia Kreatif web portal, poor IQ can be seen by the low number of visitor penetration and engagement. The aims of this research are to identify users' perception of information quality on Indonesia Kreatif web portal and analyze their causative factors. This research was...
The paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce...
Video traffic, which represents an increasing fraction of the Internet traffic, requires end-to-end quality of service (QoS) guarantees for inter-domain routing. However, providing such guarantees remains a challenge essentially because it requires a strong and fair cooperation among the different network operators or Autonomous Systems (ASes), crossed by the traffic. Having a single AS on the path...
In this paper we evaluate online audio Qur'an capability as a new media tool. The fact that the number of audio Qur'an on the Internet is increasing, raised a question on whether it could be used as a new media tool to incorporate both Islamic teaching and civilization. Audio Qur'an is a resource that will impact people in many ways. In the circumstances where people that cannot be able to read text...
Neighbor Discovery Protocol (NDP), which is the main supported protocol for IPv6, has some security issues due to its intuitive trust of every device inside the local area network. Securing NDP becomes an important research area as the Internet is deployed widely in public areas, such as airports, where the trust is not necessary between hosts, which may expose them to attacks. In addition, securing...
Base on innovation resistance theory, this research builds the model of factors affecting consumers' resistance in using online travel in Thailand. Through the questionnaires and the SEM methods, empirical analysis results show that functional barriers are even greater sources of resistance to online travel website than psychological barriers. Online experience and independent travel experience have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.