The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and voluminous on regular basis. For instance, the financial transactions performed via online by users are unsecure and unauthenticated in many contexts. Methods and algorithms exist for secure data transmission over different channels, perhaps lacks to achieve high performance...
This paper presents an Internet based SCADA platform for monitoring the structures of a hydropower plant. The remote monitoring system communicates through TCP/IP sockets with the embedded gateway module interfacing the sensor network, facilitating configuration of the sensors, acquisition and archiving of the measurements, visualization of the data in real-time or of the archived data, as well as...
In this paper, we present an approach that can detect scene nudity level with high precision using different deep net configurations. For this purpose, a recent approach [1] which has intense and very deep convolution layers is used. During net modelling, we strive to obtain most successful net configuration by comparing different Dropout models and image sizes -64 × 64, 128 × 128-. Additionally,...
The article discusses the development of thematic ontology for use in the educational process. We propose a method for the automated thesauri development using the web ontology editor "OntoMASTER-ontology".
A Health Mobile Application (App) has enabled users to access personal health record at any time and place. As an App provides health service to users, it is crucial for an App to be accessible to every user. However, it is often an App does not provide proper visual aid for users who are visually impaired. We restrict the range of visually impaired to retinitis pigmentosa (RP) patients in this paper...
Recently, many efforts have been spent on observing individual's psychological states through analyzing users' social activities on SNS. In this paper, we propose a novel method for identifying the users with depressive moods by analyzing their daily tweets for a long period of time. Then, for more accurately understand their tweets, we exploit all media types of tweets, i.e., images and emoticons...
Image steganography is a method for secure data transfer over the internet using image. Now-a-days, as internet is growing, information security is a major concern. In this paper, we present a new technique for image steganography in spatial domain. The proposed method extracts two LSBs and two MSBs of the selected pixel value. Then perform the XOR operation on first and last bit and second bit and...
This research proposes user interface requirement guidelines when designing a tour website for older people. At the moment, because of the increased shift from manual to an automated method to acquire services such as accessing a tour websites, it is important to give more attention to design and development that caters to the needs of the older people. Currently, there are some design problems in...
In this paper we will discuss on how electronically linked Brain to Computer Interface(BCI) and Computer to Brain Interface(CBI) can be used to develop Brain to Brain Interface(BBI). In this system, non-invasive technology is deployed to achieve conscious Brain to Brain(B2B) communication. At BCI site, data is transmitted using ElectroEncephaloGraphy (EEG) a non-invasive method to record electrical...
Given the increasing amount of digital resources, it is possible that students experience information overload and disorientation in Virtual Learning Environments. For this reason, we propose three visualization models able to represent the knowledge of the domain in a visual manner, at the same time that facilitate the access to the learning resources. We tested our proposal in terms of usability...
One of the goals of network administrators is to identify and block sources of attacks from a network steam. Various tools have been developed to help the administrator identify the IP or subnet to be blocked, however these tend to be non-visual. Having a good perception of the wider network can aid the administrator identify their origin, but while network maps of the Internet can be useful for such...
The main objective of this article is to identify the best e-banking websites in Poland from the point of view of an individual customer. Using modern IT tools for communications with customers of banking services, banks create competitive advantages, as well as, opportunities for providing banking services in a convenient way for consumers. After a short introduction the authors defines the assumptions...
With the rapid development of social networks, more and more users choose to share their own photos with their friends. Especially, users prefer to share the photos they took during traveling, thus there emerges many user generated content for place-of-interests (POIs). So based on the user contributed photos, we can summarize each POI by mining location-of-interest (LOI, which represents the attractive...
In this paper, we propose a new approach to preventing the SSLstripping attack, CAT+S. Through the analysis of existing solutions and a user survey, we determine how to better protect users from the SSLstripping attack and provide stronger overall protection even when the SSLstripping attack is not a factor. The details of CAT+S design and implementation are then described and discussed. Finally,...
Countries around the world have established different practices when designing, implementing and maintaining their identification systems to keep a registry of all their population. On analyzing the features of many of these systems, one can clearly recognize the unique personal identifier particularities in each setup. In this paper, we intend to reason about the design decisions related to the personal...
This paper presents a new hybrid honeypot architecture which focuses on the coverage of large IPv6 address spaces. Results from a 15-months darknet experiment verify that attackers and researchers utilise various approaches to scan wide and unforeseeable IPv6 address ranges which cannot be managed with current honeypot solutions. The huge IPv6 address space not only makes it hard for attackers to...
This research is about a development of software tool for hiding message in a directory index in Windows NTFS file system. A method of hiding message in directory index slack space is a newly proposed technique. A B-tree is adopted to manage file indexes in a directory in NTFS. Operating characteristics of the B-tree is utilized for hiding message in the slack space of an index record. Not to be revealed...
PINs have been around for half a century and many insecure PIN-related practices are used. We attempted to mitigate by developing two new PIN memorial assistance mechanisms that we tested in an online study. We were not able to show an improvement in memorability, mostly because people did not use the memorial aids. We realised that a greater insight into PIN Management mental models was needed, in...
This study focuses on the learning progress bar, an important element of gamification, to examine its effects on diverse learners with different learning styles when facing three different types of web-based instruction (segmentation and non-linear presentation, homogeneous environment, and lack of social interaction). The Index of Learning Styles (ILS) is adopted for measuring MOOCs learner learning...
One of many challenges in a web information systems is the capability of staying stable and available as the number of users and requests increase rapidly, what we call scalability. This paper provides a model based on development of events-oriented applications, non-blocking in the environment Node.JS with the non-relational database model (MongoDB), preparing to establish scalability and a comparison...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.