The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Standardization of Internet protocols is usually a somewhat slow process. The reasons for this are manifold. Besides working out the protocol details, things like opposing stakeholder interests can prolong the consensus building process, new requirements might be introduced that require technical changes to the protocol, coordination across standards developing organizations (SDOs) might add delays...
LBP (Local Binary Pattern) is a commonly used operator to extract LBPH (LBP histogram) of an image for local texture description. For gender classification, we proposed an innovative method by extracting multi-scale LBPH in DoG (Difference of Gaussian) space in this paper. Given a facial image, we firstly preprocess it meticulously to avert the local variations of images which probably be caused by...
Traditionally, IP geolocation has been focused on finding the exact location of a given internet host. In this work, we focus on the problem of simultaneously geolocating large numbers of IP hosts to within a discrete set of geographical regions. Towards this objective, we present a fusion algorithm that combines information from multiple, heterogeneous sources of location information. Our algorithm...
In the solution of urgent scientific task of the research and development of methods and means of processing of information resources in electronic content commerce system (ECCS) using the developed classification, mathematical software and the generalized architecture of ECCS. Researched and improved classification of ECCS based on the analysis and evaluation of such systems, which allowed to define,...
The remote laboratory management system called RemLabNet and its new booking module are presented. The RemLabNet consists of experiments based on the internet school experimental system, a database, a diagnostic server, a content management system including modules and a web interface. The PHP and JavaScript languages are used for the creation of the booking system for experiments. Through this module,...
The paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
This article introduces a recognition method of near-duplicate images based on the interaction of perceptual hash and image key points. Using these methods allows to create a descriptor describing the unique features of the image.
In this paper we present a solution for manual and automatic enrichment of VoD database of a broadcaster. Data is collected by devoted aggregators, which collect information from the Internet. Solution is incorporated with visual representation of database and its information. User interface enables all CRUD (create, read, update and delete) operations to be applied on the available data.
Today the amount of information in the internet growth very rapidly and people need some instruments to find and access appropriate information. One of such tools is called recommendation system. Recommendation systems help to navigate quickly and receive necessary information. Generally they are used in Internet shops to increase the profit. This paper proposes a quick and intuitive book recommendation...
In the past (classical supply chain) the supply of goods generally flow starts from factory or producer, then producer sent to a storage area called the warehouse. When finished goods are collected, the goods from storage area or warehouse (WH) is distributed to the distribution center (DC). Then after the goods were placed in the Distribution center, then the goods are shipped to the retailer (retailer)...
In this paper, an architecture of remote laboratory for the college of optoelectronic engineering is proposed. Any university which wants to establish distance education for the college of optoelectronic engineering can use the proposed architecture or hardware and software to manage experimental assignments from any location. There are four main parts of the proposed remote laboratory: remote users,...
The article presents analysis of the Internet topology graph model. We use usual methods to analyse properties of the model but also propose some new characteristics. Our experimental data set comprises long-term traceroute records for several thousands of target hosts, repeatedly executed from a fixed source. We processed particular routes by merging them all together thus creating a single connected...
Along with the widespread development of Internet and mobile applications, the demand for more flexible and dynamic networking services increases. It becomes a new challenge for many carriers to deploy a variety of new services by effective provisioning of network resources. Software-Defined Networking (SDN) is a novel approach to make networks reconfigurable and extensible such that new services...
Many computer-based devices are now connected to the internet technology. These devices are widely used to manage critical infrastructure such energy, aviation, mining, banking and transportation. The strategic value of the data and the information transmitted over the Internet infrastructure has a very high economic value. With the increasing value of the data and the information, the higher the...
Food Consumption Patterns will be very important to regulate human nutrition. With good and organized food consumption patterns all the nutritional needs can be fullfilled. An unorganized food consumption patterns can lead to lack of nutritional needs‥ Besides, it will cause disease. The problems that occurred in Indonesia are still many people who lack awareness about good food consumption patterns,...
Due to the development of Web technology, the research on Internet big data become more and more popular. Source tracing of event is a practical problem, however, research on event source from multi-source event data is rare. The incompleteness and incredibility of Internet data are challenging issues for detecting event source. In this paper, event is mapped into Network Public Opinion Data Space...
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques work well in some developed countries, the assumption of a strong delay-distance correlation that they often rely on may fail in many developing countries for poor network connectivity...
To combat with botnet, early detection of the botnet communication and fast identification of the bot-infected PCs is very important for network administrators. However, in DNS protocol, which appears to have been used for botnet communication recently, it is difficult to differentiate the ordinary domain name resolution and suspicious communication. Our key idea is that the most of domain name resolutions...
Web application developers have been bothered about cross-browser compatibility problems caused by different kinds of web browsers. Existing techniques and tools commonly compare and analyze screenshots of websites rendering in different browsers. In this paper, we propose a technique for statically analyzing cross-browser compatibility problems. Our approach can easily detect whether web applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.