The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the current problematic of development a set of indicators user direction, informational direction and reputational direction to perform task of directions of the organization of life cycle of virtual community. The method of determination of possible variants of balancing indicators of virtual community is developed. These indicators based on the analysis of the subject area of...
“Internet + intelligent education” is the inevitable trend with the development of the education industry. iStudy, a Generic practice platform is a kind of practical curriculum evaluation platform for teachers and students, which combines operation, practice, evaluation, examination and item bank management with comprehensive teaching system and management system and is being accepted and enjoyed...
The rapid development of digital technology and the constantly increasing number of online information sources have meant that students' skills related to information seeking are crucial for academic success. This Paper presents the selected findings of a case study with an emphasis on identifying differences and similarities between international and Croatian students' information seeking skills...
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security...
Until this day information overload is an important issue and the influence of information technology cannot be denied. Even though there is a lot of existing research on the relation of information technology and information overload it is still contradicting. Therefore, this systematic literature review investigates the contents and applied research designs of the body of knowledge of the relation...
In the solution of urgent scientific task of the research and development of methods and means of processing of information resources in electronic content commerce system (ECCS) using the developed classification, mathematical software and the generalized architecture of ECCS. Researched and improved classification of ECCS based on the analysis and evaluation of such systems, which allowed to define,...
Practical work in the laboratory is the most important component in training of the polytechnic specialists. The usage of information and communication technologies as well as Internet makes it possible to increase the number of laboratory facilities available for training students. Bauman University has some laboratories of remote access specialized in such important disciplines like robotics, nanotechnologies,...
The problem statement of this research paper is focused around the challenge that any organization faces in today's day while synchronizing their strategy with real time challenges of the Market given the changing Demographics, increase in the Telecommunication Density and increase in the usage of Social Media. The method adapted by organizations to obtain competitive intelligence in the past has...
This research utilizes social network analysis to determine the success of three different disruption strategies on a child exploitation network extracted from the public internet. Using a custom-written web-crawler called LECEN, data from a set of hyperlinked child-exploitation websites was collected from the Internet. From these data, two types of networks were coded: the nodes of the first network...
Databases and documents are usually confined into separated environments inside organizations, controlled by Database Management Systems (DBMS) and Information Retrieval Systems (IRS), respectively. However, both DBMS and IRS frequently store data about the same entities, in this way presenting opportunities for integration. We propose a framework for DBMS-IRS integration that uses top ranked terms...
While confronting the global IPv4 address exhaustion, it is important and crucial for the entire Internet environment to smoothly upgrade to the next generation Internet Protocol, IPv6. Due to the budget constraints, different organizations should decide the priority of the IPv6 upgrade among all the provided services according to the degree of the necessity and the difficulty of the upgrade. Our...
The Great East Japan Earthquake, which occurred in March 2011, damaged information infrastructure. Latest researches showed that some parts of communication networks are available even immediately after the earthquake. Therefore, connections among the different available parts of communication networks can keep communication quality for damaged areas at disasters. Recently, “Software-Defined Networking...
The goal of the Development Clearinghouse (DevClear) is to facilitate social networking between stakeholders in development assistance. These stakeholders include communities in need of essential human services (EHS), non-governmental organizations (NGO) that provide development assistance to communities, and funding agencies (FA) that provide financial, and other support for development assistance...
Disasters have been causing huge damages to infrastructure as well as human life from a long time. One of the key problems faced when disaster hits an area is efficient distribution of resources such as medicine, food, water etc. In this paper, we propose a solution particularly for distribution of food. We have proposed a solution in which a big disaster region is divided into smaller areas (regions)...
The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content. Within the current study we explore both of these methodologies...
Applications based on SaaS platform have been appeared as services for common users and enterprise users and an integration management of literature contents of libraries in the country is needed in the future. SaaS based literature contents integration has not been done here yet. Therefore, this paper presents SaaS based technology which integrates literature contents of public organizations or libraries...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
By constructing e-Science projects, we have explored that the creation of a collaborative research platform, is in great demand. This paper explores the requirements and approaches to build a collaborative research platform named Duckling for e-Science projects. Our case study is the e-Science project in joint research center of the Chinese Academy of Sciences and the Qinghai Lake National Nature...
Future internet architecture, based on the integration of existing networks, face a series of important technical challenges, one of them being the management of diverse user identities. Existing research efforts often tackle only a small range of identity issues, offering limited solutions only applicable in well defined administrative domains. This paper presents an identity management and discovery...
In today's data-intensive world, the need for data organization has increased dramatically. Distributed systems are dealing with unheard amounts of data arising primarily from the popularization of pervasive computing applications and the so-called “data-in-the-cloud” paradigm. Naturally, agent-coordination systems are affected by this data-increase phenomenon as they are often used as the basis for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.