The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Broadband Internet access security relies in the implementation of perimeter policies and in the adoption of access control lists. These measures are precarious because they are based on common and not frequently updated profiles that lack residential users threat information. In this paper, we analyze and profile residential users traffic from fixed broadband Internet access networks of a large telecommunication...
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
In big data environment, the performance of the focused crawler has a great impact on the results of crawling. In order to improve the efficiency and accuracy of focused crawler, this paper proposed a combination method of HTML analysis and text density and multi-reference factors similarity calculation method based on the basic principle and key technologies of focused crawler. The proposed method...
It is said by a famous Chinese entrepreneur Jack Ma that which understands yourself the most is not your own but the computer. It is not difficult to find that the computers will always automatically recommend something for you. How do these things come from? It is the computer system which does the statistical analysis to your Internet habits, sorts out the content you may want to browse, and finally...
Studies about improving of health quality conditions of handicapped members is getting increase. Internet become one of the important part of human life in todays. Accessibility is a term that determine of using systems and product by everyone. Our aim in this study to determine difficulties of handicapped persons to use internet and smart phone. According to results of the study, handicapped persons...
This study proposes a sign language CG wiki. The wiki constructs a human motion video and its word information. The video is created with a CG character instead of a human, and it is controlled with a button. The user can study the sign language, and can register a new word and video. This paper discusses the wiki's user interface in an experiment. Some sign language speakers evaluate the wiki. Its...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
The main aim of this article is to analyse the collected opinions on the use of electronic banking tools by individual clients in Poland, at the end of 2016. The research has been carried out using a CAWI method. The survey questionnaire, which was verified by finance experts, was made available to respondents on the servers of the Faculty of Management at the University of Warsaw. The following article...
The aim of this article is to analyze the use of basic e-government elements by individual users in Poland in 2017. Article presents the results of research highlighting popularity, use and influence of e-government functions that support such application in reality. Seventeen core e-government functions, most popular among respondents, were selected based on prior consultation, being the baseline...
Despite the modern gas equipment, combustible gas leakage related emergency situations still take place and lead to building demolitions and human losses. Leak integrity failures because of anthropogenic and natural factors make impossible to prevent such emergency in other ways except providing continuous monitoring of combustible gas concentration and notification for people and special services...
The huge number of malware introduced each day demands methods and tools for their automated analyses. Complex and distributed infrastructure of malicious software and new sophisticated techniques used to obstruct the analyses are discussed in the paper based on real-life malware evolution observed for a long time. Their impact on both toolsets and methods are presented based on practical development...
The concept of persistent identification is increasingly important for research data management. At the beginnings it was only considered as a persistent naming mechanism for research datasets, which is achieved by providing an abstraction for addresses of research datasets. However, recent developments in research data management have led persistent identification to move towards a concept which...
Triage on the battlefield is a very challenging task. Life of the wounded soldiers depends on the efficiency of this process and there is still lack of supporting solutions. This paper presents a new approach for using Internet of Military Things in combat triage. We propose an ontological approach to evaluate soldiers' health state and information framework which allows first responders and commanders...
Internet can be misused by cyber criminals as a platform to conduct illegitimate activities (such as harassment, cyber bullying, and incitement of hate or violence) anonymously. As a result, authorship analysis of anonymous texts in Internet (such as emails, forum comments) has attracted significant attention in the digital forensic and text mining communities. The main problem is a large number of...
This paper reports comparative authorship attribution results obtained on the Internet comments of the morphologically complex Lithuanian language. We have explored the impact of machine learning and similarity-based approaches on the different author set sizes (containing 10, 100, and 1,000 candidate authors), feature types (lexical, morphological, and character), and feature selection techniques...
Gender classification is a well-researched problem, and state-of-the-art implementations achieve an accuracy of over 85%. However, most previous work has focused on gender classification of texts written in the English language, and in many cases, the results cannot be transferred to different datasets since the features used to train the machine learning models are dependent on the data. In this...
This paper describes SIIP (Speaker Identification Integrated Project) a high performance innovative and sustainable Speaker Identification (SID) solution, running over large voice samples database. The solution is based on development, integration and fusion of a series of speech analytic algorithms which includes speaker model recognition, gender identification, age identification, language and accent...
Smart factories of the era of the fourth industrial revolution or Industry 4.0 that employ a completely new approach to production are beginning to emerge. In this context, information and communication technology driven by the Internet of Things, Data and Services play a vital role. To demystify and showcase how a smart factory works, a reference model consisting of a principle solution and a working...
Existing Internet protocols assume persistent end-to-end connectivity, which cannot be guaranteed in disruptive and high-latency space-terrestrial networks. To operate over these challenging networks, Delay/Disruption Tolerant Networking (DTN) architecture has been proposed. Although recent advances, evaluating DTN routing in large-scale networks spanning prolonged time-evolving topologies remain...
The development of the Internet functions now affects many activities, talks, meetings, shopping, and learnings. E-Learning is part of the development models of learning that utilizes the internet. The current development model of online learning still needs support and new innovations. Politeknk Elektronika Negeri Surabaya (PENS) has an online learning application that uses the Moodle LMS. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.