The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many computer users lack awareness of the connections their computers make to hosts on the Internet. Some realtime tools exist for host-based network monitoring, but they are too complex for average computer users as they require expert knowledge to use and interpret. Connection Cartographer is a tool to let non-expert users visualize geographical information about their network connections in real...
Regulation which requiring all Internet Service Providers to apply negative content filtering based on domain name system in their services, known as blacklisting/blocking method such as Trust positive or Nawala, apparently is still considered less effective to support safe and productive use of the Internet in the community. A more accurate system is needed, and whitelist offered by the government...
Chat application is a feature or a program on the Internet to communicate directly among Internet users who are online or who were equally using the internet. Chat applications allow users to communicate even though from a great distance. Therefore, this chat application must be real-time and multi platform to be used by many users. The development of information and communication technologies are...
The article describes a unique public informational Internet resource — the portal of next generation networks multi-service platforms of domestic and foreign manufacturers, used in Russia. The above objectives and opportunities of the portal, shows the architecture of a software system and the structure of the database of the portal. The portal is applicable for a broad range of telecommunication...
Many of today's devices are internet-enabled with IPv4 internet addresses, exposing them to internet threats. To determine the true scale of vulnerabilities being introduced, particularly in the IPv4 internet address space, a new methodology of scanning the entire IPv4 internet space is required. To improve scanning speeds we created a framework combining fast connectionless port scanners with a thorough...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
There are several methods proposed to extract data from biological databases developed by bioinformatics experts. These methods retrieve bioinformatics information through the use of structured and semi-structured data tools from remote database servers. This paper investigates and evaluates the performance of these methods in terms of their ability to gain access to a cross representation of bioinformatics...
The advances in embedded technology and automation makes the human daily life easier. In this study, a smart home is presented an application including sensor and controller nodes connected to the custom design local wireless network. User reaches to the system using a web-base interface or using a smart phone application. We tested our system through conducted experiments and the results will be...
The Tor Network, a hidden part of the Internet, is becoming an ideal hosting ground for illegal activities and services, including large drug markets, financial frauds, espionage, child sexual abuse. Researchers and law enforcement rely on manual investigations, which are both time-consuming and ultimately inefficient. The first part of this paper explores illicit and criminal content identified by...
As we know internet is a beautiful thing. But it can lead to enmities, if not used properly. As the use of internet is growing participation of user is also growing. Through internet we can make world smaller by communicating, sharing, posting, tagging information's to people. As informative internet is, it can also be non-informative. This non-informative information is of no use in a business oriented...
The aim of this study is to construct a system for pre-processing a text, including tokenization and correction of statements from social network, in order to adapt them for further extraction of information and sentiment analysis. Correction algorithm uses dictionary methods, statistical methods and rules-based approach. The system was tested on 50 statements including different kinds of errors....
This paper provides a description of how to get artifacts generated by Line messenger applications such as user activities, contact information, chatting, and deleting the messages. It also provides correlation and interpretation of messages that are formed during the conversation scenario. This paper can be used as a guidance for investigators and forensics analysts in conducting investigation process...
The recent popularity of smartphones causes significant increase of upskirt filming cases in many countries and regions. To search upskirt images in suspects' IT devices and block them on social media, an effective detector is demanded, but it is neglected by both academic and commercial communities. Three commercial pornographic image detectors and one detector distributed by the U.S. National Institute...
Automatic kinship verification from face images aims at verifying whether two persons have a kin relation or not by only comparing their visual facial similarities. This is an emerging topic in face analysis and computer vision. Automatic kinship verification is useful in many applications such as finding missing children, image annotation, and social media analysis. In the recent years, there has...
Currently, TV white space databases communicate the available channels over a reliable Internet connection to the secondary devices. For places where an Internet connection is not available, such as in developing countries, we propose a broadcast based geolocation database. This proposed geolocation database will broadcast the TV white space (or the primary services protection regions) on a rate-constrained...
Mathematical Models Database (MMD) is an online repository of mathematical models that can be easily used for research purposes, in teaching or in performing comparative tests. In a single free-of-charge, freely accessible Internet service all the data from the database is available with an expected (in its final form) several ready-to-use models, either purely mathematical or physics-based. Apart...
Democracy is vital and powerful political source in major countries and for the established and development of democracy, elections are being practiced. Pakistan is a democratic country and still practicing the manual and expensive methods for election. That causes slow procedure, bogus entries, counting errors, misuse of ballot papers, and serious security, accessibility, and reliability faults....
Snowden's whistleblower from the last year made people more aware of the fact that we are living in the Internet surveillance era. Privacy of Internet communication has been disrupted. In this paper, application for privacy protection in chat communication, named CryptoCloak, is presented. CryptoCloak provides privacy protection for chat communication. Encrypted communication is masked with dynamic...
Analog switches are mounted on the walls. To operate them the user needs to physically press the switch to turn ON or OFF any appliance. This hassle of manually operating a switch is replaced by a smart technique which involves operating the switches using the web browser present in mobile phones, laptops or any other electronic gadgets. Smart switches already exist in the market today, but are very...
As one of the basic data resources of Internet, IPv4 address is the most important identity for terminal users to access online resources. With the development of modern Internet, more and more intelligent applications need the terminal's geolocation information to supply high quality services. How to locate the geolocation of the source IP address has become a very important topic in Internet research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.