The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The arrival of new electronic devices and high-speed Internet connections have provoked a revolution on the Web design, introducing new concepts as responsive web and OneWeb. Web developments should be able to adapt to any device. Applying these concepts it has been created a web application called "Formulas App", which is a perfect complement for enriching learning scenarios, mainly dictated...
Smart spaces support development of advanced service-oriented applications that introduce intelligence into Internet of Things environments. Current development meets the performance challenge, since the intelligence is achieved by the cost of performance. In this paper, we experimentally study a representative application for smart spaces — the SmartRoom system. It assists humans in such collaborative...
Laboratory education is very important and plays a vital role in science and engineering courses. The cost needed for the setting up of a good laboratory can be huge and expensive to institutes that are heavily resource constrained. The rapid development of information and communication technologies, on the other hand, has had a remarkable change in the education system. This paper provides a comprehensive...
Wi-Fi is a local area wireless networking technology that is widely used for different purposes such as data transmission and wireless communication. Wi-Fi connection will most often result in faster, more reliable internet access and it is cheap. A penetration test on Wi-Fi is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system...
Participation by the citizens in core activities of governance, social, cultural and political issues is seen as an indicator of the development of any state. The access to internet has provided an important tool for the participation of people in developing countries like India, China and Brazil. The use of internet has created an upsurge in the economic sphere of the country. Its use is no more...
A supportive environment is one of the key factors that contribute to an effective learning process. This study aims to determine the factors that help build a supportive learning environment in order to keep the student engaged in academic and other activities of the institute/university. The paper reviews various criteria that help in the creation of such an environment for students. Based on the...
Pharming is a type of social engineering attack wherein an attacker wants to steal sensitive information of internet users. Pharming is advanced technique than Phishing attack. In phishing, attacker's URL is different from targeted legitimate website URL but in case of pharming, attacker's URL is same to legitimate URL. Pharming attacks can be conducted by exploiting vulnerabilities in DNS server,...
Under the new situation, the network with a unique open, virtual, interactive features, makes the students participate in the higher degree and pays more attention to the Ideological and Political Theory Course, it can also optimizes and enhances the teaching mode. In the teaching practice of the curriculum "the Outline of Chinese Modern and Contemporary History" in Guilin university of...
Advances in computers, information and networks, especially in the Internet and the Web, not only offer us novel services, but are also bringing about a digital cyberspace and a further digital cyber world. Numerous digital things or cyber entities will be generated and will reside in the cyber world, and countless real things in conventional physical, social and mental worlds will possess some cyber...
Windows 7 is a personal computer operating system developed by Microsoft Corporation, and it belongs to Windows NT family. This paper concentrates on the topic of analyzing the security level of Windows 7 Operating System, and security level of the information system highly depends on the operating system. To estimate the security grade of Windows 7 operating system, we use the graph model to describe...
This paper discusses some basic methods of text documents classification. Results of its analysis are presented in the table of comparative characteristics in accordance with the list of proposed parameters.
The world is facing a lot of issues related to cyber crime. The technology has developed and it should be used for a constructive purpose. But the technology is being used for destructive purpose and hence we can see a lot of cyber crime victims. As per the data collected in the past years the cyber crime in the globe has increased to a great extent and the persons committing the crime are using technology...
E-Government is become an important tool that governments around the world tend to use in order to facilitate governments service. Currently governments in many of developing countries are planning for e-government projects. This is mainly to facilitate governmental services for citizens and better control for their documents over the manual process. However, many of which countries have different...
Looking at cyber war, cyber threat becomes the pitfall as the threats are what that results in a war at a level so big that can shake the political activities. Often the threats are misunderstood or not looked carefully at. Cyber-attacks extracts confidential data at macro and micro level. It's about the advanced threats that are emerging now days in the form of codes and we focus upon the future...
The use of Internet is immensely growing and applications are stretching in our daily lives. Be it for household purpose or use to government organizations, no matter what the person is or what job he does, Internet is important. Security is also needed for applications such as shopping, banking transactions, education, public services etc is important too. With wider usage, internet is also known...
With the ever increasing man-machine interaction, automation of process and decline in hardware and software cost, the amount of digital data generated and used is increasing day by day. The big data referred here is the massive amount of digital data generated in each and every second in structured, semi-structured and unstructured format throughout the world. This emerging field of big data analytic...
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers with simple attacks to cause denial of service. We proposed a defense mechanism based on a proof-of-work protocol. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of...
The patient monitoring system is important in Telemedicine system. The patient details are upload, download by mobile phone, personal computer, Laptop using 3G or 4G internet modem in the Telemedicine nodes. The transmitter and receiver side of the download and upload of X-rays and scanner images speed is less for the problem of uncovered or less internet signal strength in the rural Areas. This paper...
In this paper, we apply the k-core decompostion to analyse the Autonomous System (AS) level Internet connectivity graph from January 2006 to October 2013 and finally obtain 94 Internet Nuclei for each month. Then, we empirically study the evolution and characteristics of the Internet Nucleus and find that the size of the Internet Nucleus grows in a linear form, which is different from the exponential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.