The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cooperation between autonomous vehicles is receiving a growing attention from the academic literature. As a promising field, there is a need for studies that can provide both an overview and a structured analysis of the present literature. This paper presents a systematic mapping for the scenario of systems with cooperation of non-urban vehicles, presenting the steps for the accomplishment of...
The aim of this study is to propose an information system that should help boost cooperation between business and academia and their innovativeness. Its novelty relies on introducing such a system architecture and business processes that allow implementing the paradigm of open innovation easily. More specifically, the proposed system: (i) automatically acquires data from the Internet and extracts...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
This paper describes SIIP (Speaker Identification Integrated Project) a high performance innovative and sustainable Speaker Identification (SID) solution, running over large voice samples database. The solution is based on development, integration and fusion of a series of speech analytic algorithms which includes speaker model recognition, gender identification, age identification, language and accent...
The development of the Internet functions now affects many activities, talks, meetings, shopping, and learnings. E-Learning is part of the development models of learning that utilizes the internet. The current development model of online learning still needs support and new innovations. Politeknk Elektronika Negeri Surabaya (PENS) has an online learning application that uses the Moodle LMS. However,...
This paper presents the current problematic of development a set of indicators user direction, informational direction and reputational direction to perform task of directions of the organization of life cycle of virtual community. The method of determination of possible variants of balancing indicators of virtual community is developed. These indicators based on the analysis of the subject area of...
In this paper, we explore the task of intellectual information system creation for content formation. We developed the general recommendations for design of the intellectual system. Our system has special modules for processing of information resources. We created the software for formation, control, and implementation of content and made experiments on “Online newspaper” and “Online magazine” systems...
Websites have become a form of information distributors; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders or information about that particular product; businesses make use of the Internet to expand business opportunities or advertise the services they render on a global...
Many animal species exist in this world and there are always new species being discovered each year. Therefore, it is very important that these valuable species be documented properly to be referred to in future. Numerous information retrieval systems for managing and documenting animal species today only allow users to search animal images and descriptions online via text-based input. Therefore,...
Due to the emerging Big Data paradigm, traditional data management techniques result inadequate in many real life scenarios. In particular, the availability of huge amounts of data pertaining to social interactions among users calls for advanced analysis strategies. Furthermore, heterogeneity and high speed of this data require suitable data storage and management tools to be designed from scratch...
Owing to the transition of analogue to digital television, certain channels, that were used as guard to avoid interferences between the transmissions, are now unused. These channels are a potential medium of transmission for TVWS to bring Internet to remote areas where it's tough to install cable. To fulfil that TVWS becomes a reality, a database able to determine the unused channels in the UHF and...
Today almost everyone is using internet for daily activities. Whether it's for social, academic, work or business. But only a few of us are aware that internet generally we access only a small part of the overall of internet access. The Internet or the world wide web is divided into several levels, such as web surfaces, deep web or dark web. Accessing internet into deep or dark web is a dangerous...
“Internet + intelligent education” is the inevitable trend with the development of the education industry. iStudy, a Generic practice platform is a kind of practical curriculum evaluation platform for teachers and students, which combines operation, practice, evaluation, examination and item bank management with comprehensive teaching system and management system and is being accepted and enjoyed...
As the developing of Beidou navigation positioning technology and the wireless Internet, the demand of the mobile phone location service is increasingly urgent. And the location information sharing between each other becomes an important research focus, and also the core of the current location based service (LBS) software. At present, all the related LBS software is based on C/S architecture, developed...
This paper presents an architecture to provide endto- end per-user services with support to client mobility, designed according to the SDN and NFV paradigms. Our service platform dynamically configures and launches service requests when the client connects to the network, which are used by a multidomain orchestration system to arrange the required network configuration and computational resources...
Internet is popular for people at all ages. A computer is used to access the Internet but a user needs to authenticate himself to the system in order to gain access. The problem of a typical authentication technique is to memorize a password. Lots of junior high school students in Pakthongchaiprachaniramit School cannot remember their own password and this work is proposed to solve the problem by...
Geographically locating an IP address is of interest for many purposes. There are two major ways to obtain the location of an IP address: querying commercial databases or conducting latency measurements. For structural Internet nodes, such as routers, commercial databases are limited by low accuracy, while current measurement-based approaches overwhelm users with setup overhead and scalability issues...
The report addresses a remote molecular diagnostics system for studies of the edge plasma inT-10 tokamak at National Research Centre Kurchatov Institute. Web control of a monochromator and a CCD camera based on Internet technologies was used to monitor radiation. The structure and communications chart of the software components implemented in the system are described. A special web application has...
Network signatures are used in network intrusion detection systems that try to detect an Internet worm by monitoring network packets. There are many ways to make polymorphic worms. One technique depends on encrypting the body, which erases both signatures and statistical characteristics of the worm byte string. Currently, intrusion detection system reads all the incoming packets and tries to find...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.