The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online experiments are frequently used at internet companies to evaluate the impact of new designs, features, or code changes on user behavior. Though the experiment design is straightforward in theory, in practice, there are many problems that can complicate the interpretation of results and render any conclusions about changes in user behavior invalid. Many of these problems are difficult to detect...
Integrated monitoring system, enabled with semi-structured datastore, is a promising solution for monitoring SaaS systems. However, according to increasing scale of SaaS systems and their long-term of service operations, the monitoring system has faced the problem in response times of log analysis and storage consumption. Our empirical observation is that the problem is primarily derived from the...
In this paper, the development of a driver deployment and communication system for a food delivery service company is discussed. The client company seeks to improve its infrastructure by implementing new system over its existing system that utilizes traditional communication methods. By using various cloud-based server technologies, we were able to deliver a system that fulfilled all the requirements...
This project arises from the need to redesign the main technological infrastructure of the mining company. Current centralized infrastructure is obsolete and is no longer reliable and productive for the company. Currently, it is not possible for the network to facilitate the design of new technological solutions (installation of new servers, virtualization, storage networks, the configuration of advanced...
Push notification is a mechanism that allows individuals to receive updated information quickly. Push notification delivery needs to be effectived and has to be paid attention to time zone differences between countries in order to generate time-appropriate notifications. This push notification system was developed using distributed event-based system approach. The research methodology consists of...
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems...
In this paper, an investigation into cloud-to-ground (CG) lightning activity data from the year of 2005 to 2014 collected by lightning location system (LLS) of Shanghai district is shown, including the ground flash density (GFD) maps of Shanghai City and comparison of annual lightning days (LDs) with thunderstorm days (TDs) collected by the Shanghai Meteorological Agency (SMA). At last, the peak current...
Proximity Integrated Circuit Cards (PICC) are widely used for public transport fare collection. The stored contents in the card can only be accessed or modified after the card is able to authenticate the Proximity Coupling Device (PCD) or reader using a shared secret key. We propose a new authentication scheme that is not based on shared secret keys. Instead, authentication is based on the card and...
Curricula of the Universities and especially of the Universities of Applied Sciences should be, in the best case, developed in such way, that graduates' knowledge should reflect contemporary requirements of the industry, without to losing the assertion of universality as the central perspective of the higher education. This awareness is often identified, but in the real case, the organization of the...
Most of the existing information security management studies focus on information security of large organizations preventing security threats. However, a security management perspective of a small and medium-sized (SME) company is relatively different. Small and medium sized companies are at a greater risk because they cannot afford expensive tools. They lack process improvement capabilities and effort...
This scheme is a method for controlling functionality of a mobile device. The operation of the element function of the mobile device is blocked by a blocking code, and the operation of the blocked element function is unblocked by an unblocking code. The blocking code is a code used to block the operation of the element function of the mobile device in an area in which a user is located, and the unblocking...
In this paper, we focus on the problem of analyzing the operating performance of insurance companies, and this problem is crucial for modern financial industry development. Index system for evaluating operating performance of insurance companies is made up of four parts: 1) Profitability, 2) Solvency, 3) Capital adequacy and 4) Management ability. Main idea of this paper is to introduce DEA model...
In today's knowledge society data plays a central role. Large parts of an organization's critical data currently resides in databases which makes them an attractive target for cyber-attacker. The increasing digitization and interconnection of organizations combined with growing complexity of IT systems led to increased attack surface of most organizations. At the same time cyber-adversaries increased...
In recent years, with the growing popularity of smart phone and the developing of mobile communication, public transport card recharge system based on smart phone was designed to make it easier and convenient for people to go out. This system has two different realization methods, one for NFC smart phone and the other for non-NFC smart phone. People can recharge their public transport cards anytime...
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
Small and medium enterprises (SMEs) are viewed as a key driver of economic and social development. SMEs in Nairobi face stiff competition due to a saturated market offering the same typed of services. This project aims to create links between SMEs using a web-based service. This paper describes the project plan and prototyping method of this web-based service encompassing testing and analysis plan-for...
The emergence and growth of cloud computing has made a serious impact on the IT industry in recent years with large companies starting to offer powerful, reliable and cost-efficient platforms for businesses to build and reshape their business models. Showing no sign of slowing down, cloud computing capabilities now include machine learning, with facilities for both designing and deploying models....
Computing over the Web can be applied to solve problems of many types of users, namely companies, which can thus benefit from remote services, e.g., from academia, without the user's awareness. An illustration of scientific computing over the Web is described, based on remote servers in parallel, as fits separable time consuming tasks. The illustrative problem chosen was the probabilistic behaviour...
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough...
Information leakages are one of the main security threats in today's Internet. As ICN is expected to become the core architecture for Future Internet, it is therefore mandatory to prevent this threat. This paper proves that some ICN configuration prevents information leakages via Data packets and shows that it is an open problem to prevent interest packets from carrying encoded crucial information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.