The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the thriving development of technology devices, the information and communications technology (ICT) industry has shown considerable growth. Recently, smart campuses in developing countries have become a exceptionally large part of the education market because numerous high-tech system and platform companies use their products to provide a total solution in the field of ICT. This study developed...
This paper considers a contract and pricing decision problem in online display advertisements. We model the entire decision process as a Stackelberg game that involves one advertiser and one publisher. As the game leader, the publisher initiates the game by setting cost-per-impression (CPM) under pay-per-view (PPV) pricing scheme or cost-per-click (CPC) under pay-per-click (PPC) pricing scheme, and...
This paper examines knowledge construction in a distributed learning environment supported by social web tools. Research data was gathered from online asynchronous discussions in a first-year master's degree course in multimedia in education. Our analysis was modelled on a validated analysis model and results indicate that, despite a significant percentage in the phase of sharing and comparing information,...
In this research, a generic analytical model of voltage response of fractance in time domain which is often cited in various disciplines such as control engineering and electronic engineering etc., has been proposed. This model can be applied to fractance of any order under any type of current excitation. So, it has been found to be beneficial to various fractance involved disciplines stated above...
Group Purchase is discussed for a distribution channel including one manufacturer and three retailers. Retailers' optimal order quantities and optimal profits are analyzed under two kinds of strategies, namely the separate purchase and group purchase. Then the optimal ordering strategy is discussed for the single retailer under the various modes of cooperation. The results are shown that the dominant...
Spam web pages have posed great challenges to the development of search engines. The content spam is among the commonly used. Along with the development of Internet technologies, the content spam is difficult to detect. The current detection methods for the web page using content spam technique primarily rely on the statistical features, which has obvious limitations. In this article, a spam webpage...
In this world of emerging technologies, online frauds are rapidly increasing with the increasing popularity of online shopping era. It has been identified in the past research that the shilling is main cause behind online auction frauds. Several researchers have proposed various methods to counter the possibility of shilling in online auction. In this paper we have proposed a mechanism which uses...
A content can be replicated in more than one node in Information Centric Networks (ICNs). Thus, more than one path can be followed to reach the same content, and it is necessary to decide the interface(s) to be selected in every network node to forward content requests towards such multiple content containers. A multipath forwarding strategy defines how to perform this choice. We propose a general...
Along with the booming popularity of photo sharing services, an ever-increasing number of photos are shared and made publicly available on the Internet. This brings new opportunities for image-based applications and services. In this paper, we explore the potential of using Internet photo collections for building 3D models of indoor environments and providing indoor mapping and localization using...
Aiming to meet the explosive growth of mobile data traffic and reduce the network congestion, we study Time Dependent Adaptive Pricing (TDAP) with threshold policies to motivate users to shift their Internet access from peak hours to off-peak hours. With the proposed TDAP scheme, Internet Service Providers (ISPs) will be able to use less network capacity to provide users Internet access service with...
One of the problems in e-learning, as stated in the constructivism theory is to manage the diverse experience levels of students. These varying levels have to be taken into account in designing learning models due to its significant impact on the e-learning system effectiveness. This paper proposed a new instructional design model applied to a website for learning programming language. This model...
Making use of TMM of OPNET simulation tools and integrating the operational environment and mission scenario with the DSR routing algorithm of the mobile Ad Hoc network, this article presents a more realistic model of the tactical internet battlefield environment. It offers a good simulation environment for the tactical internet and information warfare.
Crowdsourcing-based video service systems, e.g., Thunder Crystal, are novel content distribution platforms composed by a large number of agent devices, acting like miniservers. Most agents are normal Internet users who would like to earn rewarded cash by uploading content through their devices. Compared with CDN, the bandwidth cost is much cheaper; while compared with Peer-to-Peer(P2P), the bandwidth...
According to the characteristics of information dissemination and user interaction on the internet, a discrete time model, which is based on the node influence, is proposed. In the model, every node has the opinion and the influence which is defined as the weight of network, these nodes will redistribute the weights and update their opinions during the each period. The simulation results show that...
With the development of e-commerce and smart tourism, the combination of tourism and the internet has caused tourism purchasing in China to shift from traditional channels to online ones. However, while online tourism consumption has many advantages there are also high associated security risks. Understanding how perceived security impacts online tourism purchasing behavior is extremely important...
Online shopping stores are a new hype in Jordan, and consumers are still not used to buying products online without touching and testing these products, they are also not used to paying online. The intention to buy online is affected by both technology factors and socio-cultural factors specifically trust.
In an effort to shed light on the current stage of disciplinary evolution in the IS field, this study sought to systematically and objectively identify and document the theories that have been used in North American IS research, as well as to identify trends regarding the adoption of new theories and the rate of theory turnover. To this end, we used computational techniques to search more than 10...
E-commerce gives customers the access to a vast quantity of products but, at the same time increases in a significant way the volume of information they need to deal in a buying decision process. Aggregators of information offer comparison shopping solutions to reduce the consumers' cognitive efforts overload by adding Decision Support Systems to aid consumers with their purchase decisions. Obviously,...
The problems of internet actions analysis and active control are studied according to the Internet system self-organization theory, and from the non-equilibrium system point of view. The rules of the internet actions from existence to evolution are analyzed using the theories. The paper firstly poses the concept of non-equilibrium Internet action based on studies of complication in Internet system,...
Ever since the introduction of the first epidemic model, scientists have tried extrapolating the damage caused by a contagious disease, given its spreading pattern in the premature stage. However, understanding epidemiology remains an elusive mystery to researchers specifically because of the unavailability of large amount of data. We utilise the study of diffusion of memes in a social networking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.