The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The exponential growth of the web and the use of social networks in our area, gave birth to a new concept called digital identity, it's all digital traces that can be left in the internet such as photos and various comments. However, these digital identities are exposed to many dangers such as phishing, fraud, cyber-crime and identity theft. However, with an interconnected world, it is important to...
In view of the problem that currently the students choose online test questions blindly, the establishment of the item recommendation system is necessary. According to the student's level, an estimating algorithm is used to sort items and recommend the question which is in the front of the sort to the student. According to the study of student over a certain period of time and all the answers to the...
Data preparation is crucial for the validity of the resulting data model and its subsequent successful application. The paper presents a preprocessing of the data on the behavior of students on social media sites using the CRISP-DM methodology. Data was collected through questioner shared among prospect students of Faculty of Economics Subotica. This has created an adequate platform for the implementation...
During the last decade there has been a shift in the way learning process is conducted. One of the main reasons is that technology is changing. Due to this fast movement, concepts like “class”, “workgroup” and “learning process” are changing too. Learning processes are going beyond the boundaries of what was known as “class”. Face-to-face models get mixed with online environments where students are...
The establishment and improvement of effective e-commerce system is necessary to the tourism development in Sanqing mountain. Through analyzing the shortage of current tourism e-commerce websites of Sanqing mountain and according to the different tourist demands, the tourism e-business system for Sanqing mountain based on customer relationship management(CRM) was presented, which contains information...
With the 3G explosive growth, telecom operators pay more and more attention to traffic management. Based on the key elements analysis of traffic operation, the paper proposes the ATNE model of traffic management, which content four key element "application, terminal, network, experience", and it can provide valuable reference of traffic management strategy.
Based on the project flowchart management information system model in the process of enterprise products development, a UML model of the project management information system based on the PDM technology for the financial equipment enterprises is proposed. The design and debarment of the proposed project management information system are finished completely. The UML modeling method and .NET technologies...
This paper studied the problems of parameter system construction for large-scale Internet of Thing situation assessment. It also states the research of situational awareness and assessment of IP network briefly, the situation assessment differences between Internet of Thing and IP network are dicussed, for some especial aspects and the significance about large-scale Internet of Thing situation assessment...
P2P applications supposedly constitute a substantial proportion of today's Internet traffic. The ability to accurately identify different P2P applications in internet traffic is important to a broad range of network operations including application-specific traffic engineering, capacity planning, resource provisioning, service differentiation, etc. However, current P2P applications use several obfuscation...
This paper takes a survey to the college students, and analyzes the impact imposed by variables of purchase intention and the inter-relationship among variables such as perceived value, perceived risk and perceived usefulness. The empirical results show that perceived value is the main factor affecting purchase intention, perceived risk has no direct impact on purchase intention, and perceived usefulness...
We design a user interest model based on ordered pair behavior in order to improve the stabilization of the existing models. An innovation in this paper is the view that user interest model can be organized by user ordered pair behavior relevance. The main idea is to accumulate the value of user behavior, and then subtract the behavior value of some unrelated behavior according to the proportion of...
The Internet of Things envisions a multitude of heterogeneous objects and interactions with the physical environment. The functionalities provided by these objects can be termed as ‘real-world services’ as they provide a near real-time state of the physical world. A structured, machine-processible approach to provision such real-world services is needed to make heterogeneous physical objects accessible...
Social Networks Service (SNS), is becoming more and more popular and a lot of studies have been carried out in this active field. However, traditional analysis methods based on single machines is not suitable because the network is growing too large. MapReduce, a programming paradigm proposed by Google, gives us a new approach to solve large-scale social networks analysis problem by making use of...
Adolescent internet addiction is becoming a serious problem in China. The aim of the present study was to examine the relationship between resilience and internet addiction. Three hundred and forty-eight vocational technical school students from Hebei province completed the self-reported questionnaire. Structural Equation Model was used to explore the effects of resilience, perceived class climate,...
Now, it's a popular technology of Web programming development based on J2EE platform Framework, which Struts framework that based on MVC design pattern divided the system into the controlling part, business logic part and view one, and achieved the decoupling between layers, Hibernate framework offered a method of packaging a lightweight object for JDBC, and reduced the difficulty of developing business...
With the expanding of network teaching, more and more college students begin to addict to the internet, so the design of more scientific network teaching environment is given more attention nowadays. In network teaching, not only the teaching content should be emphasized, but also a safe network teaching environment should be provided. This paper investigates the relationship between the network teaching...
Fast and efficient delivery of targeted and personalized advertisements has become a staple in E-commerce. The field of market research targeting in online environments has seen extensive research on the topic of customer targeting, but most of the information detailing the process of profiling is closely guarded by the industry. Much of what is available tells that information such as cookies and...
This research is to explore the factors affecting the social anxiety and learning adaptability for young adult Internet users. Results found that achievement expectancy, network self-efficacy, network usage rate and career awareness have significantly affected social anxiety. This result also displayed that achievement expectancy, network usage rate and career awareness have significantly influenced...
Advanced computer systems can be reached from everywhere in higher education institutions. Quick development of hardware and software resources needs frequent revising of concepts and methods for the application of computers at teaching and learning processes. The authors of this paper joined to efforts for creating concepts and method for the practical application of known higher university course...
The hierarchical network structure based on geographical regionalism realizes the unified division of global computer networks. According to this, if we set data center management server in a proper administrative area, and adopt the globally available network account, then we can design a new uniform Internet user-privilege management system which is more convenient, secure and effective.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.