The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Specialists of a number of scientific institutes in this article present examples of successful models of modern press services in institutions in the field of science and education in Russia and research their key methods in work.
A number of communications in the work of the informative sites of leading scientific organizations of the Russian Federation, including in the structure of the Russian Academy of Sciences and Federal Agency of Scientific Organizations is researched.
With the recent introduction of social software in education, there is a need for support applications that will help teachers monitor students' activity on these Web 2.0 tools. In this paper we present such an approach for learner tracking and visualization in an integrated social learning environment called eMUSE. The platform collects learner actions from each of the disparate Web 2.0 tools (by...
A new kind of floating bed named Integrated Ecological Floating Bed (IEFB) was constructed and optimized employing Oenanthe javanica, Hyriopsis cumingii Lea and artificial media. This paper studied the effect of IEFB on eutrophic water quality improvement with results showing that the average removal rates of TN, TP, NH4+-N, CODMn and Chl-a by IEFB were up to 42.6%, 56.6%, 77.7%, 13.5% and 62.2%,...
This paper investigates the prospects and compares the potential pathways of the open government, transparency, collaboration, and citizen participation initiatives in the US and in Mexico. The study aims at increasing the understanding to what extent and under which circumstances these initiatives might successfully establish or re-establish the balance of powers among the branches of government...
This paper uses the "Construction of a Harmonious Society" as an entry, combined web-based supervision of public opinions with the construction of a harmonious society, putting forward that the network supervision of public opinions have many advantages, such as full expression of public opinions and forming true free opinion market; being beneficial to find out net citizen's ideology dynamic...
Since Fall 2007, the famous Lehman brothers had suffered the “ Subprime Mortgage ” and filed bankrupt, Wall Street was faced a heavy pressure immediately: financial tsunami. More over the whole economic market in the world is all linked with one another, certainly American Press is fallen down inevitably. Meanwhile, the Amazon Company has been announced a new Kindle (eBook) to compete with web newspaper...
In this paper we propose "SoTong" system for enhancing family relationship with relation oriented communication. In the relation oriented communications, we focus on the relationship by representation and promotion of relations together with awareness of other's situation for the connectedness and the coexistence. The system captures and analyzes communication channels among modern families...
The objective of this invited talk is to present selected visions of ubiquitous computing and ambient communication based on the notion of the disappearing computer and to reflect on the resulting challenges for designing experiences in future smart environments. Our approach places the human at the centre of our design considerations and is based on exploiting the affordances of real objects by augmenting...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.