Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In a society where smartphones and mobile connectivity increasingly act as mediators and enhancers of social ties, we can identify technological solutions that bring new challenges to the user, particularly in the way he interacts and communicates with others. This article, by focusing on mobile apps that promote social and loving ties between strangers (Tinder, Bumble, Grindr, etc.), driven by a...
Large-scale high-capacity communication networks among airborne platforms are quickly becoming a reality. Today, both Google and Facebook are seeking to form networks between high flying balloons and drones in an effort to provide Internet connections from the upper atmosphere to users on the ground. These airborne networks, that will likely use directional communication links between nodes to achieve...
Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly...
Backpressure-based adaptive routing algorithms have been studied extensively in the literature. Although backpressure-based adaptive routing algorithms have been shown to be network-wide throughput optimal, they typically have poor delay performance under light or moderate loads because packets may be sent over unnecessarily long routes. Further, backpressure-based algorithms have required every node...
With the development of Internet technology and the arrival of the era of big data, it is necessary to analyze and excavate the micro video data. It can help micro video creators to create better to analysis micro video data. This paper mainly introduces the structure design, key technical points and specific implementation steps of the micro video topic recommendation system.
Internet access has become a requirement to participate in society; however, the majority of the world's population is not yet online. Citizens can self-organize cooperatively to crowdsource community network infrastructures and achieve Internet access. In order to help address that challenge, this paper provides an analysis of a crowdsourced Internet access mechanism: the distributed Web proxy service...
The denial of service attack is the most powerful damaging attacks used by hackers to harm a business or organization. This attack is one of most dangerous cyber-attacks. It causes service outages and the loss of millions, depending on the time of attack. In past few years, the use of the attack has enlarged due to the accessibility of free tools. This tool can be blocked simply by having a good firewall,...
Blockchain technology realizes unforgeable and decentralized ledger by applying P2P network, cryptography and consensus mechanism over distributed network. Its security relies on all of these technologies. One of fundamental problem of the security of blockchain technology is compromise of underlying cryptographic algorithms. This paper shows the impact of compromise of underlying cryptography and...
This paper proposed a AS relationship recognition algorithm based on the forwarding degree. Firstly, the precision of AS path set which is the input of algorithm was proved by multipoint fusion method and anomaly filter method. Secondly, forwarding degree which reprent the ASs' ability of service delivery was analysed. Lastly, AS relationship was recognized based on the forwarding degree. The experimental...
Longest-prefix name-based forwarding in Content-Centric Networking poses many significant challenges on design of routers and algorithms, because the name space is many orders of magnitude larger and significantly more complex than the IP address space. IP forwarding algorithms are no longer applicable and cannot reach the satisfactory performance. In this paper, we present a framework of fast longest-name-prefix...
Network traffic classification has become vital due to the increased flow of web traffic from services like HTTP, FTP, and SMTP etc. The idea of Network traffic classification is to categorize the network traffic and regulate the flow of data in the network there by monitoring the traffic. In this paper, a comparative analysis of different supervised learning algorithms like Ensemble learning methods,...
The excessive use of the communication networks, rising of Internet of Things leads to increases the vulnerability to the important and secret information. advance attacking techniques and number of attackers are increasing radically. Intrusion is one of the main threats to the internet. Hence security issues had been big problem, so that various techniques and approaches have been presented to address...
Dispatching of processes in industry is an extremely important process. It can decrease shutdowns and increase efficiency in solving of different problems with industrial facilities. In big plants and companies it is reasonable to apply ERP systems, SCADA and etc. However, it is an expensive way, that can't be appropriate for smaller companies or some small facilities, that needs dispatching. In order...
Recommendation algorithm has received extensive attention in recent years. It is very difficult to directly apply traditional recommendation algorithm to offer personalized recommendation based on mobile users' browsing behaviors and ensure security of mobile users' data. In this paper, through analysis of mobile users' browsing behaviors, we obtained the reason why traditional recommendation based...
With the rapid rise in social network users during recent years, social network is changing business models in the China's Internet industry. Social network produces large amounts of data that reflect the real world, so we can make conclusions about financial incidents by monitoring people's interests in social network and analyzing investors' feelings based on the data. To obtain the data from financial...
Gathering the most relevant data for one's need, from the huge collection of data in the internet is a work of great difficult. To make it easier, we propose an application called text clustering, which is an automatic grouping of text documents into clusters, so that documents within a cluster defines the similarity between them, but they are not similar to documents in other clusters. Most of existing...
The purpose of this research is to summarize customer reviews of cosmetic products that were written in Thai by using sentiment analysis technics. We expect that text summarization system will help refine the results from customer review. The consumer will then be able to select the products that meet their needs while the cosmetic company will also have a chance to improve the quality of the products...
Currently Internet usage has increased a lot due to bandwidth availaility and technology advancements. Internet is widely used for knowledge sharing, online review of products etc. Many open forums, blogs are used for this purpose. Since many users are contributing their opinions towards any query submitted by information seeker, there is a possibility of confusion. Often opinions contradict with...
Emerging Information-Centric Networking (ICN) architectures seek to optimally utilize both bandwidth and storage for efficient content distribution over the network. The Virtual Interest Packet (VIP) framework has been proposed to enable joint design of forwarding, caching, and congestion control strategies within the Named Data Networking (NDN) architecture. While the existing VIP algorithms exhibit...
Phishing is a security attack that involves the creation of websites that mimic legitimate websites, and these fraud websites bring Internet users a lot of loss. Traditional anti-phishing methods usually worked in a passive way by receiving report data of user. Due to the growing shorter survival time of phishing, this kind of methods is not efficient enough to find and take down new phishing attacks...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.