The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To ensure the low end-to-end (E2E) delay for tactile internet, short frame structures will be used in 5G systems. As such, transmission errors with finite blocklength channel codes should be considered to guarantee the high reliability requirement. In this paper, we study cross-layer transmission optimization for tactile internet, where both queueing delay and transmission delay are accounted for...
Attack traceability and attribution are two of the main tasks of IT forensics. To support this, IT forensics is not limited to investigate data after the attack has taken place. Already before the attack, an optimal environment for a subsequent investigation has to be created. While this is primarily focused on ordinary logging, we propose to set both degree and characteristics of logging, based on...
Website quality evaluation is an important research task. Evolution and a growing set of available methods are observed. The article presents the authors' evaluation methodology of the quality of websites named PEQUAL. The formal foundation of the proposed methodology is the broadening of the classical EQUAL method with aspects of preference modelling and evaluation aggregation used in Multi-Criteria...
Internet of Vehicles requires reliable Inter-Vehicular communications. Such a requirement is challenging since the wireless communication channel is very erroneous and lossy in city environments. A lot of solutions for connecting vehicles to the internet have been proposed. However, existing multi-hop gateway discovery solutions do not consider, a key issue, the unreliability of broadcast in city...
The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured on a regular basis. On the other hand, a lot of computing resources in Institute labs, government offices etc. remain underutilized, since they are used for Internet and basic utilities. The aggregation of these underutilized resources can be more than handful to...
In sight of the rapid revolutions of the information and wireless-transformation and telecommunication technologies since 2000s, most of people used to utilize the diversified computer, communication, consumer (3C) electronic devices, such as notebook, tablet PC and so on, to not only simultaneously surf and download the comprehensively public information and knowledge but also immediately share and...
Rateless erasure code (REC) is an erasure code, where the encoder generates a potentially infinite number of encoded symbols and the original message can be reconstructed from a sufficient number of correctly received packets. Many REC-based transmission protocols have been proposed for improving network throughput in lossy channel. However, state-of-the-art RECs (such as LT code and Raptor code)...
The capability to reliably and accurately identify the attacker has long been believed as one of the most effective deterrents to an attack. Ideally, the attribution of cyber attack should be automated from the attack target all the way toward the attack source on the Internet in real-time. Real-time, network-wide attack attribution, however, is every challenging, and many people have doubted whether...
Access to information is predicated on the access to a digital infrastructure. However, access to electricity and the Internet remain elusive for a significant percentage of the world's population, let alone a sustainable access in one’s local language, local context, and relating to local culture. This paper examines the issues of resource constraints, and proposes a framework to classify them. It...
With the increase of the number of college graduates, the country needs to do much in promoting their employment. Meanwhile as the rapid development of Internet lead to explosive growth of information, the real value needs to be effectively and immediately selected to benefit both employers and employees. This paper aims to propose two content based algorithms, one starting with cold boot and the...
Emergence of high-speed Internet and various smart devices has led to a rapid increase of applications on the Internet. In order to provide reliable services and efficient management of network resources, accurate traffic classification of various applications is essential. Through various methods of extraction when payload signatures are extracted, most of these payload signature formats are just...
In past few years, mobile wallet took spotlight as alternative of existing payment solution in many countries such as USA, South Korea, Germany and China. Although considered as one of the most convenient payment, mobile wallet only claimed 1% from total electronic payment transaction in Indonesia. The aim of this study is to identify the behavior and user acceptance factors of mobile wallet technology...
The rapid growth of Internet users becomes an opportunity for e-commerce company to develop its business. However, there are challenges which e-commerce company have to face. Indonesia, despite having a significant growth of its Internet users, only 27% of its Internet users who have already used online shopping. The participation of Indonesian society can be enforced by providing social interaction...
In the context of swift development of P2P e-commerce, it is critical to defending both customers and sellers from being victimized by probable deception stemming from uncertainties, vagueness and ambiguities that characterize the interactions amongst unfamiliar dealers. Accordingly, credit standing concerning each business partaker plays a decisive part in preventing fraud in P2P transactions and...
Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are...
In many shopping sites such as Amazon.com it is possible to view and write reviews of items (products and content). Reviews of items including stories, such as novels, movies, and comics, include reviewers' opinions. Often, these reviews also include descriptions of the story. In some cases, these descriptions may spoil later reader's or viewer's enjoyment and excitement. Hereinafter, we call these...
The internet becomes the major channel for the college students to receive information and public or share their opinions to the world wide without any limitation, which makes more tougher for the public opinion management in college students. This research concentrates on the characteristics of the public opinion management in the network environment and the status of the university public opinion...
The current model of centralized electricity generation, transmission and distribution is under pressure to change for a variety of reasons; environmental concerns are driving a shift away from large coal-fired generation systems to increasing adoption of renewable energy sources, which tend to be distributed and not always available on demand, and hence requiring distributed storage support. Moreover,...
For cyber-physical systems (CPSs), communications system reliability is an indispensable requirement to realize them in critical infrastructures. One of the important attributes of system reliability is availability. System availability is broadly defined as the proportion of time that the system will provide service. In some CPSs, such as smart grids, the units are distributed over large geographical...
Traditional routing in the Internet is best-effort. Path differentiation including multipath routing is a promising technique to be used for meeting QoS requirements of media-intensive applications. Since different paths have different characteristics in terms of latency, availability and bandwidth, they offer flexibility in QoS and congestion control. Additionally protection techniques can be used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.