The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The information service application and development status of tourism, mobile GIS and related technologies are discussed in this article. Then integrated with current tourism space information and attribute information, we propose Android platform based mobile tourism information service application. The corresponding modules are studied and designed. The applications can provide for tourists basic...
Participatory budgeting aims at finding an appropriate solution to meet the increasing demands of citizens worldwide for more transparency and political participation in financial affairs. Several thousand projects related to this topic have been conducted worldwide to date. In Germany, public participation rates in these projects were often below expectations of public administration and politics,...
Trust plays an important role in helping social network user make appropriate decision from abundant social information about products. A variety of social review information (e.g. ratings, voting and tags) emerge with the huge number of products on the Web. How they are utilized for searching and finding appropriate item is investigated. In this paper we propose a user credibility calculation method,...
Nowadays the Internet is closely related to our daily life. We enjoy the quality of service the provided by The Internet at the same time, but also suffer from the threat of network security. Among the many threats, SQL injection attacks are ranked in the first place. SQL injection attack refers to “when the user sends a request to the server, the malicious SQL command will be inserted into the web...
In the recently approved Information Security Doctrine (Dec 5, 2016) Russia openly aims “to deploy a national system of managing the Russian segment of the internet”. For some time, we have observed how Russia has been conducting intellectual, legislative and technical measures in order to create a purely domestic network disconnected from the global internet by 2020. In the Russian way of thinking,...
In this study is explored the changing path of e-Learning discipline since its appearance to nowadays. E-Learning has evolved in different ways in different sectors therefore it might have different implications in certain periods of time in certain sector. A small number of things have changed in the last half century as much as the way we learn. Consequently, a significant research is going on throughout...
The rapid development of digital technology and the constantly increasing number of online information sources have meant that students' skills related to information seeking are crucial for academic success. This Paper presents the selected findings of a case study with an emphasis on identifying differences and similarities between international and Croatian students' information seeking skills...
is dedicated to the practical application of information technologies and tools in competitive intelligence. The concept of competitive intelligence, the intelligence cycle and the algorithm of the process of competitive intelligence are studied. Software for collection, storage, processing and dissemination of information is reviewed. Special attention is given to the competitive intelligence tools...
A random-walk-based (RW-based) information search makes a single query or multiple queries walk around a network to search for the target information. Local navigation rules, based on which a query chooses an adjacent node to move from the current location, are important for increasing the search speed of the RW-based information search. In the present paper, we focus on degree-dependent navigation...
Nowadays, audience can easily share their rating about a movie on the internet. Predicting movie user ratings automatically is specifically valuable for prediction box office gross in the cinema sector. As a result, movie rating prediction has been a popular application area for machine learning researchers. Although most of the recent studies consider using mostly numerical features in analyses,...
Nowadays, with the massive demand for sports news, automatic generation systems based on the template technology has been deployed, which could generate massive sports news quickly and effectively. However, by using one simple template for one scenario, the pattern of text generated by such system is single. In this paper, we propose an automatic generation method based on knowledge rules to select...
Internet plays a significant role that it has helped the mankind to be advanced. One of the remarkable applications of Internet is the feature that enables to download any form of data. In order to accomplish it, devices are required that has specific functions. When a PC works for downloading purpose, it uses all its resources, though they are not wholly required and leads to large power consumption...
Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand...
Using big data technology to integrate date, transform these data into fundamental and strategic resources in enterprise marketing management and formulate and implement data-driven marketing mix strategy has become a research hotspot in enterprise management circles, and it has generated far-reaching influence on traditional marketing theory and especially marketing mix theory. From perspective of...
The diversity of wireless networks and protocols used by Internet of Things makes solutions non-interoperable. Moreover, some Things are not always able to communicate due to resource constrains or environmental factors. In this paper, those issues are addressed by introducing the concept of virtual Things. It means that each real Thing is virtualized in a local server or in the cloud, enabling communication...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
The project titled “ONLINE FLOWER MARKETING SYSTEM USING MOBILE APPS” is a comprehensive system which co-ordinates various operations in flower shop by using the mobile application through the online. This includes a variety of collections of flowers and flower made products such as flower arrangements, flower bouquets, retails and etc. This project deals with the booking of various flower products...
Nowadays, various network services, such as online shops and reservation of facilities, have been used with the spread of the Internet. Some of these services request to offer personal information to users. However, we cannot know how offered personal information is used. Thus, we feel uneasy to offer personal information to service providers. For this reason, we proposed a framework that a user can...
World wide road traffic fatality and accident rates are high, and this is true even in technologically advanced countries like the USA. Despite the advances in Intelligent Transportation Systems, safe transportation routing i.e., finding safest routes is largely an overlooked paradigm. In recent years, large amount of traffic data has been produced by people, Internet of Vehicles and Internet of Things...
The article presents an analysis of the problem of correct network interaction, based on BGP routing protocol. It analyzes the main attacks on information systems, due to the use of this protocol. Scenario of typical attack is presented. Basic measures to prevent information security threats when using the BGP protocol are offered.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.