The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The present paper is the documentation, description, and reflection about the challenges of research on the development of cognitive abilities with commercial (off-the-shelf) video games, particularly in psychology and education. This paper documents specific problems derived from the nature of commercial video games. Finally, some thoughts on how to conduct research on commercial games and cognitive...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
Customer Edge Switching (CES) is an experimental Internet architecture that provides reliable and resilient multi-domain communications. It provides resilience against security threats because domains negotiate inbound and outbound policies before admitting new traffic. As CES and its signalling protocols are being prototyped, there is a need for independent testing of the CES architecture. Hence,...
The purpose of this paper is to adapt a few sentiment analysis methods to obtain sentiment value for social network statements in the Polish language. Developed methods represent different approaches. Starting with PMI-IR, expansion of dictionary through conjunctive connections method, to determining bigram sentiment by analyzing its neighborhood. Obtained results were compared to the commercial solution...
Zero shot learning (ZSL) provides a solution to recognising unseen classes without class labelled data for model learning. Most ZSL methods aim to learn a mapping from a visual feature space to a semantic embedding space, e.g. attribute or word vector spaces. The use of word vector space is particularly attractive as compared to attribute, it offers vast auxiliary classes with free parts embedding...
The recent popularity of smartphones causes significant increase of upskirt filming cases in many countries and regions. To search upskirt images in suspects' IT devices and block them on social media, an effective detector is demanded, but it is neglected by both academic and commercial communities. Three commercial pornographic image detectors and one detector distributed by the U.S. National Institute...
Traditional machine learning traffic identification techniques usually use the features of a whole Internet flow, which makes such techniques few sense in engineering practices. Therefore, recent years, an increasing number of researchers turn to build effective machine learning models to identify traffics with the few packets at the early stage. In this paper, data gravitation based classification...
Internet usage is rising at a frenzied rate as knowledge and information sharing becomes easy and time-saving. Regrettably, the visually impaired do not enjoy this liberty and they have difficulties in using the computer and the Internet to obtain any shared and published information. This difficulty is also faced by the visually impaired Bahasa Melayu (BM) language medium Internet users. Existing...
As one of the basic data resources of Internet, IPv4 address is the most important identity for terminal users to access online resources. With the development of modern Internet, more and more intelligent applications need the terminal's geolocation information to supply high quality services. How to locate the geolocation of the source IP address has become a very important topic in Internet research...
This article combining Internet development under innovation 2.0 with the new form of material management, take West Inner Mongolia Central Railway Corporation for example. Through discussion, it propose a new mode of railway materials management and solve the problem which are widespread of the current construction enterprise material management. It will solve deep-seated problems existing in the...
With the rapid development of technology, Internet has changed people's lives and online community has become a comprehensive platform for exchanging ideas and shopping. This study develops and tests an environmental psychology model of online impulse purchase. The model captures the moderating effect of search and experience product type on the relationship between the online impulse buying intention...
CDNs are today the most scalable way of distributing content. Thanks to CDN interconnection even smaller operators can achieve global footprint. The main cost of this operation is the added latency because requests have to traverse multiple autonomous networks. The work in this article was able to quantify the real impact of this phenomenon and to point to its drawbacks and potential solutions.
Malware is one of the most serious security threats on the Internet today, it has been seen that malware authors employ variety of techniques to evade security detection but most of their techniques are discovered and blocked by antivirus programs. Still there are some evasion techniques which are not exploited in wild and are effective against antivirus programs. This paper studies the working of...
Along with advances in information technology, cybercrime techniques also increased. There are several forms of attacks on data and information, such as hackers, crackers, Trojans, etc. The Symantec Intelligence report edition on August 2012 indicated that the attacker selected the target of attacks. The type of data is valuable and confidential. The Hackers selected the target to attack or steal...
Wi-Fi is a local area wireless networking technology that is widely used for different purposes such as data transmission and wireless communication. Wi-Fi connection will most often result in faster, more reliable internet access and it is cheap. A penetration test on Wi-Fi is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system...
Anomalous payloads in network packets are a potential source for intrusion in computer networks. In this paper we come up with an efficient machine learning approach to detect anomalous payloads. The approach uses n-gram preprocessing to extract words included in the payload. Bayesian inference is used to learn normal and anomalous traffic patterns from the words extracted during training. During...
Internet traffic classification is an area of current research interest. The failure of port and payload based classification motivates researchers to head towards a machine learning (ML) approach. However, training and testing dataset validation has not been formally addressed. This paper discusses the problem of ML dataset validation and highlights three training issues to be considered in ML classification...
Gathering and analyzing statistic information is essential for every college or university, which cares about their students. This paper aims at giving theoretical overview of modern web page development and statistics gathering methods, analyzing present state of TUKE and designs a new statistics system, where emphasis is placed primarily on comfortable work of students with the system.
In the face of online advertising growing exponentially, numerous technologies have been developed to thwart the display of advertisements. This report is a comparative study of leading online software and hardware ad-blockers. In particular our research is on AdBlock, AdBlock Plus, and AdTrap. This report describes how they work, what types of advertisements they do and do not block, device compatibility,...
Sybil attack is useful for mitigating P2P botnets, and the effect depends mainly on influence of Sybil nodes. However, how to improve influence of Sybil nodes is still a problem rarely studied. Taking Kademlia based botnets as the research object, we proposed a method to improve influence of Sybil nodes in P2P botnets. We constructed a testing system based on Planetlab and KAD network, and conducted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.