Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost of copyright infringement to the film and music industries range in the tens to hundreds of billions of dollars every year. The vast majority of this illegal content is shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, illegal file streaming, and one-click...
This article presents a survey of the factors that indicate evasion in distance education, as well as the data mining techniques that are being used in the detection of evasion. As a methodology, we have used the systematic review, analyzing the works published in the last five years. The result indicated that there are multiple factors that influence evasion, which were systematized in four dimensions,...
An innovative way of conceiving the teaching of science is through the implementation of Inquiry-Based Learning (IBL) (1). This is defined as a process in which “questions are asked about the natural world, hypotheses are generated, research is designed, and data are collected and analyzed in order to find a solution to the problem” (2). This research project in development seeks to implement the...
The basic indicators of the life cycle of technology were analyzed and the generalized system for the evaluation of the life cycle phase is allocated. Indicators are considered as properties that technology must have to fit a certain stage of its existence. The existing approaches of technology development analysis were studied. The generalized classification, which is a list of indexes for the proper...
The clustering of web resources is a significant and difficult task. In previous work has suggested ways to unify web information sources, trying to solve problems like heterogeneity of content, lack of structure, availability, distribution, quantity and quality. However, there are more complex than other domains where the solution is an even more cumbersome problem, due to the quantity and variety...
Ongoing emphasis on the fourth industrial revolution requires further focus on the Internet of Things (IoT) as a means to integrate all relevant entities within a single technological system. In the integration process, a gateway to relay the raw data to an IoT endpoint is essential so that a joint interface among the heterogeneous domains can be provided. This work describes the development of a...
The aim of the paper has been to make individuals with disability in arms, who have been fed during meals, completely or partially independent by use of the self-feeding device. In this paper, it describes a self-feeding system designed to increase the independence of a person who is unable to use their arm for self-feeding. It is FeedBot, a highly integrated and compact service robot with manipulator...
China's Internet has been over 30 years of development, but there are still many problems. According to China's 2011–2015 correlation data, the evaluation index system of internet gaps established. A clustering is on the current situation of the development of Internet of China's 31 provinces and regions. The digital divide phenomenon focus on Internet development indicators measuring is obvious in...
This paper addresses the development of information and communication technologies (ICT) presented in global readiness and development rankings. Our primary focus centers on the study and comparison of national ICT legislation, as well as the use of social media in the last election campaigns of the countries of Mexico, Argentina and Venezuela. The paper reveals the common features of the legislations...
We study mobile user behavior from cell-level location trace (CLLT). Since CLLT contains no GPS coordinates of mobile users, we infer approximate user locations from the cell locations they visit. We build upon the vast literature on user behavior analysis and demonstrate the ability to extract user behavior in the absence of the more precise GPS information. We focus on the “leisure time” behavior,...
The colors of characters suitable to presentation slides were proposed. Here, five color combinations were proposed. A combination has three colors of “Base color,” “Main color,” and “Accent color.” The “Base color” is for the background. The color white is used as the “Base color.” The “Main color” is for the part becoming the frame. The “Accent color” is for the place where we want to emphasize...
Organizations make extensive use of Big Data to classify and profile users, in order to effectively personalize their online messages. Big Data is also increasingly relied on as a photograph of society, creating expectations of an increasingly more accurate predictive science. Yet, there are systemic challenges in using Big Data as a comprehensive source of information, and there is also public resistance...
As for the traditional Internet, network management usually did not evolve together with the newly introduced networking technology, and becomes a post-technology these days. In order to avoid patching Software-Defined Networking (SDN) later, an additional management plane may possibly be of great significance. Currently, both SDN management and non-SDN network management still coexist, and Simple...
Internet plus era has brought great changes to the enterprise. The changes of the enterprise's business process and internal control increase the difficulty of evaluating the risk of material misstatement. In order to grasp the risk of material misstatement under Internet plus environment more accurately, this paper selects enterprises issued non-standard and standard audit opinions within five years...
The article describes computational experiment and further research work in the area of identification of destructive information influence in social networks. The problem of distribution of suicidal content via open sources is presented. On the basis of calculations there was made a conclusions about the prospects of using the methods of information retrieval in the task of identification of the...
Web of world facilitates search results on massive collection of data using Internet. While obtaining search results corresponding to a particular search query, authentication of search results becomes an important question, as different sources contribute data in every moment which are stored in (un)trusted third party servers. In this paper, we discuss on the authenticated search results of some...
The working principle of intelligent English translating search engine is discussed in this paper. Then the method of Meta search that is fused with acquired results of each search is analyzed in detail. In the research of fusion results we adopt the optimized scheme which integrates weight and quality method to extract the retrieval results of component search engine, and to perform purification...
In recent years the numbers of out of shelves books in the Surabaya's universities library is decreasing. This is not a surprising phenomenon. The digital natives, as the primary customers of the library, are generation which always connect to the world through their gadgets. Library which in the past was the solely place for searching the information is no longer the source of finding the information...
This paper aims to study factors influencing trust and purchase intention on the Internet, develop model of trust and purchase intention by empirical data, and analyze path of antecedents influencing purchase intention. This study identifies the factors proposed in the existing social commerce constructs: recommendation and referrals, rating and reviews, forums and communities, together with three...
A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.