The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ministry of XYZ plays a substantially strategic role in providing technical and administrative supports as well as carrying out an analysis for the highest office. Such office possesses not only highly critical but also vital assets of national information. This study is conducted to scrutinize the implementation of information and communication technology (henceforth ICT) advocated by one of the...
With the development of search engine marketing, more and more search engine focus on the precise advertising. In order to make it sense, this paper did a series of experiments using Baidu as example. After analysis the five main procedure of the experiment, we get a mature search engine market system. Using these experiment data, this paper innovative imaging the future network direction and point...
Identifying review manipulation has become one of hot research issues in e-commerce because more and more customers make their purchase decisions based on some personal comments from virtual communities and e-business websites. Customers consider these personal reviews are more reliable than the existing internet advertisements. Consequently, some enterprises attempt to create fake personal comments...
This paper proposes a Quality of Experience (QoE) test methodology for adaptive streaming service. We analyze the factors influencing the QoE of adaptive streaming, and evaluate the QoE of the end-to-end service. Our research gives the evidence that adaptive streaming improves end-users' subjective perception greatly compared with fixed-rate streaming in terms of QoE. Two groups of experiments are...
The paper conducts a research on the word frequency, readability, sentence length, lexical density and word syllables of college English test papers band 4 in the past five years. Based on the research, a list of words with high frequency is sorted out through text analysis computing tools.
On behalf of the rapidly and widely disseminated smartphone technology into the public, lots of social network sites and location-based social applications are accumulating a huge volume of massive crowd's daily experiences and thoughts in an unprecedented scale. We can regard them as novel data sources for accomplishing various social analytics, which have usually required lots of efforts to collect...
In Malaysia, although the government has promoted technology inclusion of rural area, the consideration of readiness for technology is being neglected. Research effort on technology readiness in Malaysian rural area is low. This research argues that low technology readiness may worsen the disparity of e-inclusion in Malaysia. Hence, this research is performed to provide evidence of the extreme importance...
This paper discusses a preliminary study on the socioeconomic composition of student population in higher education institutions in Malaysia using the Higher Education Socio-Economic Index (HESEI). The HESEI was developed to capture a student's academic ‘advantage’ or ‘disadvantage’ based on a set of socio-economic variables, which would then be used to classify students into various socioeconomic...
Information-centric network (ICN), which is one of the prominent Internet re-design architectures, relies on in-network caching for its fundamental operation. However, previous works argue that the performance of in-network caching is highly degraded with the current cache-along-default-path design, which makes popular objects to be cached redundantly in many places. Thus, it would be beneficial to...
In the Internet of Services (IoS) vision of the Internet, applications are developed as services using the web standards. Model-based testing combined with active model inference is one of the methods to test the applications pretty automatically, in particular to look for vulnerabilities. But one part still needs to be written manually, the test driver. It contains an abstraction of the real application...
This paper focuses on measurement of information society in Poland. The aim of this paper is twofold. The first objective is to present a coherent picture of measurement methods for information society. The second aim of the paper is to show measurement findings of information society in Poland. Firstly, the paper presents available methods of information society measurement and a core set of internationally...
Objective: the objectives of this article are: (a) to provide an analysis of the key factors of an efficient web strategy with regard to the issue of patient empowerment, (b) to build an index for measuring the degree of empowerment of healthcare providers' web sites, (c) to measure the degree of "patient web empowerment" within the Italian National Health Service (INHS). Methods: a Patient...
Advances in information and communication technologies (ICTs) have created a global environment in which citizens from more developed countries have greater access to mobile broadband Internet services. The research question posed in this study is: Do national policy initiatives, regulatory measures, or governance practices increase a nation's mobile broadband diffusion? There is little research that...
The capabilities technique offers a new direction to defend against DDoS attacks. As a typical capabilities scheme, Traffic Validation Architecture (TVA) shows much good performances. However, the management of capabilities in TVA has not been fully taken into account and results in more difficult in actual deployment. So we propose a novel scheme based on index and the Least-Recently-Used (LRU) algorithm...
We propose a dual hash tables algorithm which can realize the durable top-k search. Two hash tables are constructed to keep the core information, such as score and time in the inverted lists. We use the key-value relationships between the two hash tables to calculate the scores which measure the correlations between a keyword and documents, and search the versioned objects that are consistent in the...
In recent years, the Internet of Things (IoT) has become a hot research issue and is changing the way how people live and work. IoT has a lot of benefits and meanwhile, it also brings about great challenges to the search engine community. In this paper, we analyze the challenges in the IoT search engine technology and propose a """"Hybrid Search Engine Framework for the Internet...
The objective of the paper is to propose a measurement model for trustworthiness of a document to ensure information security. the definition of trustworthiness in this context refers to the reliability value of the information in the document. the document here refers to an article or a web document. the proposed model relates to an approach for assessing trust of data for use of the information...
Content-Centric Networking (CCN) is a new network architecture that rethinks the model of network communication. In this architecture all the network sources will be looked as content and routed by name. In this paper, we describe a scheme about the memory management in CCN and explore the impact of this management. We hope to design a solution for the in-network cache. To this purpose, we set up...
Content Centric Network (CCN), a typical incarnation of the Information Centric Network (ICN), which is an active research topic of Future Internet Architecture. Naming the content's chunks, retrieving and forwarding the content chunks according to their names are the core ideas of CCN. But the length of the content's name is variable length, which is an obvious difference from the IP address in the...
Energy management system (EMS) utilizes information flow to control power flow in order to balancing and optimizing the power flow every moment and place. Conventionally, the EMS is centralized one. However the architecture of future EMS is distributed & autonomous, interactive & coordinated. A new concept and architecture of future EMS for smart girds, i.e. EMS family, are proposed. Some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.