Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Nowadays Internet has become a major public opinion formation and diffusion platform. How to acquire the public hotspots and trends by collecting and analyzing the massive data on the Internet is an important research topic in public opinion analysis. In this paper, we firstly introduce the definition and framework of Internet public opinion mining, then focus on the comparison and analysis of key...
The rapid development in wireless technologies and multimedia services has given rise to new requirements for the Internet, such as supporting billions of mobile devices and transmitting huge amount of multimedia content in real time. Content-Centric Networking (CCN), a future Internet architecture for efficient content dissemination, has been attracting ever-increasing attention from both academia...
The evolution of web has changed the way of interaction with the user. Web 2.0 encouraged more contribution from the user of varying level of mapping experience and is called Crowd Sourcing. Open Street Map is also the outcome of Crowd Sourcing. It is collecting huge data with help of general public, researchers have started analysing the data rather than collecting it. The aim of this study is to...
Social media platforms such as blogs, social networking sites, content communities and virtual worlds are tremendously becoming one of the most powerful sources for news, markets, industries, and much more. They are a wide platform full of thoughts, emotions, reviews and feedback, which can be used in many aspects. Despite these great avails, and with the increasingly enormous number of Arabic users...
Customers extend robust trust to a business when they believe the business puts their interests first. Good experience of banking services and recommendations of other customers can increase trust. Loyalty and Word of mouth (WOM) is accepted as key factors successes of marketing. This paper seeks to discover the affecting factors on positive word of mouth and loyalty based on trust enhancement that...
Online videos, e.g., YouTube videos, are important topics for social interactions among users of online social networking sites (OSN), e.g., Facebook. This opens up the possibility of exploiting video-related user social interaction information for better video recommendation. Towards this goal, we conduct a case study of recommending YouTube videos to Facebook users based on their social interactions...
Automatic Dependent Surveillance-Broadcast (ADS-B) is one of the key components of the next generation air transportation system. Since ADS-B will become mandatory by 2020 for most airspaces, it is important that aspects such as capacity, applications, and security are investigated by an independent research community. However, large-scale real-world data was previously only accessible to a few closed...
Although during the last decade considerable efforts have been invested in the integration of different wireless technologies, a new surge of interest is arising due to the upcoming internet of things (IoT) in which many relevant application scenarios rely on location information. However, due to the heterogeneity of the devices, ergo the heterogeneity of information available, novel indoor positioning...
Traffic fatalities and injuries in Japan have declined for twelve years by the comprehensive counter-measure for the reduction of traffic accidents. The efforts include enhancement of vehicle safety performance in both passive and preventive safety area. With regard to passive safety, major reduction effect was brought by airbag system, seat belt and crashworthiness of vehicle. For further reduction...
In this paper we explore the possibility of inferring activities of daily life (ADLs) from aggregate power load signatures of people's homes, which has many applications including e-healthcare. Such power load data are available from smart meters that will be widely deployed in many countries by utilities or customers, creating an infrastructure at the forefront of the Internet of Things (IoT). The...
We propose a technique of automatic classification of DRDO tender documents into predefined technological categories. The dataset comprised of 698 tender files obtained from DRDO website. The dataset was processed and fed into Weka toolkit. Experiments were conducted using Naïve Bayes classifier with 10 folds cross validation. The documents were classified with 75.21 percent accuracy by technology...
To reduce loss of life and property from fire, an early warning is an imperative. A fire detectionsystem based on light detection and analysis is proposed in the paper. This system uses HSV and YCbCr color models with given conditions to separate orange, yellow, and high brightness light from background and ambient light. Fire growth is analysed and calculated based on frame differences. The overall...
TV Service using a mobile device as a second screen has been increasing. We propose a new TV system which is able to augment representation of TV programs beyond the TV screen. In the system, which we named augmented TV, since animated 3DCG content interlocked with TV programs is overlaid on live video from the mobile device camera in the mobile device screen by augmented reality techniques, the representation...
Detecting and identification the network traffic attracts many attentions in recent years. Statistical approach using the machining learning algorithm can classify the network traffic efficiently without detecting the payload of every packet. At the same time, the accuracy depends on the statistical features of the training set. However, the traditional process without pre-treatment of the statistical...
It is impossible for severely disabled people to browse or learn through the Internet due to the mere lack of independent control of the mouse. This paper proposes a brain computer interface (BCI) to aid severely disabled individuals, such as people disabled by amyotrophic lateral sclerosis (ALS), in browsing or learning on the Internet. By analyzing specific components of event-related potentials...
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can result in huge loss of data and make resources unavailable for legitimate users. With continuous growth of Internet users and traffic, the importance of Intrusion Detection System (IDS) for detection of DoS/DDoS network attacks has also grown. Different techniques such as data mining and pattern recognition are being used...
Real-time internet traffic classification has potential applications in next-generation internet security and bandwidth management. Current machine learning-based algorithms for traffic classification, however, present scalability issues that would degrade system performance if executed to make control decisions on real-time streams. This tension gives rise to competing performance costs for traffic...
The problem of automatically extracting opinions and emotions from textual data have gained a lot of interest recently. Unfortunately, most studies on Sentiment Analysis (SA) focus mainly on the English language, whereas studies considering other important and wide-spread languages such as Arabic are few. Moreover, publicly-available Arabic datasets are seldom found on the Web. In this work, a labeled...
Due to the concerns associated with Direct Recording Electronics (DREs) and the limitations of the proposed verification method, such as Voter Verified Audit Trails (VVATs), an alternative scheme known as End-to-End (E2E) cryptographic voting was proposed. E2E cryptographic systems aim to resolve the conflict between secrecy and accuracy, two fundamental requirements of the electoral process. Additionally,...
Mobile phones are quickly becoming the primary source for social and behavioral sensing and data collection. A great deal of research effort in academia and industry is put into mining this data for higher level sense-making, such as understanding user context, inferring social networks, learning individual features, and so on. In this work, we have an attempt to predict a user's status in campus,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.