The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, there are a lot of hotel booking systems. However, the quality of the systems and interconnection with another system is very different. In this article, the fuzzy approach and expert system for hotel booking system is proposed. The proposed approach is based on evaluating hotel services for different kinds of hotel guests. The output of the expert system is a proposal of suitable hotel...
The problem of content change tracking on the web had various applications starting with human operators or software tools monitoring a web resource. The problem becomes more complicated if the human operator or the software tool needs to monitor changes in a particular area of the web resource. This article proposes a solution for tracking changes in Internet data sources focusing on using low storage...
The main aim of this paper is to provide open-source and open-hardware solution for home control automation systems. Final approach uses wireless communication, solar powered sensor array and simple scale-up system network and it is called HomeBeacon. System consists of one central station and multiple portable units providing the sensor array. As a control part, various action units can be implemented...
Search engines alleviate the task of finding information on Internet very easy. Web crawler is the main part of any search engine that follows the URLs to gather information from the Web. For topic specific crawling, a special type of crawler called focused Web crawler is used. Focused crawler tries to find high quality information on a specific topic while avoiding irrelevant links. In the era of...
Many IP Geolocation services and applications assume that all IP addresses within the same /24 IPv4 prefix (a /24 block) reside in close physical proximity. For blocks that contain addresses in very different locations (such as blocks identifying network backbones), this assumption can result in a large geolocation error. In this paper we evaluate the co-location assumption. We first develop and validate...
Internet Protocol Security (IPSec) is a standard suite of protocols defined by Internet Engineering Task Force (IETF) to provide security which includes data authentication, integrity, and confidentiality. IPSec provides data security at the IP packet level. IPSec developed for IPv6 as well as for IPv4. IPSec protocol provides an elegant solution to the security problem of IP protocol, at IP layer...
This paper describes a conceptual structure of application, which based on user preferences personalize news feeds. Personalize news feeds application allows for user to save time and gives him only interesting articles, news.
Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes. Such information...
Social network sites primarily aim at entertainment, however, there is a possibility of their use in education. Present university students, particularly those in engineering education, seem to be overwhelmingly digital natives since technological devices are part and parcel of their everyday life. Thus, the purpose of this study is to explore benefits and limitations of SNSs with respect to their...
In order to assist the international popularization of Chinese traditional furniture culture, digital technology is introduced into cultural inheritance of traditional furniture. In this paper, it analyzes the database construction hierarchy of Chinese traditional furniture culture, and the digital conversion means, and thus to build modules of digital platform for Chinese traditional furniture culture...
This paper deals with a novel sensor network system designed for gathering disaster information including physical environmental information and potential signals of survivers. The system consists of numerous sensor probes and a central database server. The sensor probes organize their own ZigBee network, which is managed by the central database server. The server is connected to the Internet to be...
Business Intelligence is new important area of informatics. It presents options to work with data and provides basic theoretical determination of the issue. Business Intelligence as a process of transforming data into information and knowledge is one of the fastest growing areas of information technology. We want to deepen knowledge and skills and show how we can work with data and acquired important...
Cultural heritage applications within smart city environments are becoming extremely popular to public authorities. The success of such applications lies on several factors like user-friendliness and data presentation as well as the amount and accuracy of cultural data they can offer to users, static or mobile, on-demand. This paper presents the design and implementation of a multipurpose, multidiscipline...
Gathering and analyzing statistic information is essential for every college or university, which cares about their students. This paper aims at giving theoretical overview of modern web page development and statistics gathering methods, analyzing present state of TUKE and designs a new statistics system, where emphasis is placed primarily on comfortable work of students with the system.
Until this day information overload is an important issue and the influence of information technology cannot be denied. Even though there is a lot of existing research on the relation of information technology and information overload it is still contradicting. Therefore, this systematic literature review investigates the contents and applied research designs of the body of knowledge of the relation...
in television white space networks, secondary users are mandatory to query an accredited geo-location spectrum database (GSDB) in order to determine the vacant channels or white spaces. The recent developments of the Protocol to Access White Spaces (PAWS) by the Internet Engineering Task Force (IETF) have proposed to standardize communication between the GSDB and white space devices. To enable efficient...
Online Social Networks (OSNs) provide platform to raise opinions on various issues, create and spread news rapidly in Online Social Network Forums (OSNFs). This work proposes a novel method for Profiling Forum Users (PFU) by exploring their behavioral characteristics based on their involvement in various topics of discussion and number of posts in respective topics posted by them in OSNFs dynamically...
Over the past 20 years web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution will continue,...
Stored SQL injection (SQLI) and Stored Cross Site Scripting (XSS) are the top most critical web application vulnerabilities in present time. Previous researches have shown that black-box scanners have relatively poor performance in detecting these two vulnerabilities. In this paper, we analyze the performance and detection capabilities of latest black-box web application security scanners against...
The Internet of Things (IoT) aims at empowering anything to connect to the Internet and to collect data about itself and the environment in which it is situated. Therefore, the IoT has been producing a wide range of data. Our aim is to deliver a way of incorporating the small data generated by each thing into larger datasets to get more meaning out of these data. A thing, equipped with sensors, can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.