The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer networks connection becomes the most important way for people to contact each other, share information, and transmit privacy data. Because the Internet is not secure enough, data hiding techniques provide a good manner to deliver secret data with security. HTML webpage not only can be used to advertise a company's product but also used to share someones experience or knowledge. The HTML file...
Cross-media retrieval is a challenging problem in multimedia retrieval area. In the real-world, many applications involve multi-modal data, e.g., web pages containing both images and texts. How to utilize the intrinsic intra-modality and inter-modality similarity to learn the appropriate relationships of the data objects and provide efficient search across different modalities is the core of cross-media...
Questionnaire is a general and indispensable method used frequently and widely in many academic, engineering, medical, commercial and political survey research activities to collect information about opinion or behavior of some groups of people. Today, many questionnaires are performed on the Internet by some ways of web applications. However, until now, there is no questionnaire specification language...
So-called multimedia cloud services (MCS), including SNS, have been widely spread, while various issues expressly related to privacy have been confirmed. For example, users' privacy would be significantly infringed if information aggregated from cloud services is collected, analyzed and utilized without users' permission or without full understanding by users, especially due to the nature of multimedia...
There are various ways to use digital technologies for teaching. In this research, they were used with the objective of making the students design and produce Digital Educational Resources (DER), in this case vodcasts. These vodcasts covered all the curriculum content of the discipline of Geology, 12thGrade, in order to promote learning and to verify their effects on educational outcomes. To achieve...
In this paper, we a novel personalized image tag recommendation algorithm based on tensor factorization which is suitable to be used in the Web2.0 Platform. Firstly, the framework of the personalized image tag recommendation system is given, which is made up of three parts: 1) collecting the history of user tagging behaviors, 2) modeling the user interests from the tagging history, 3) obtaining the...
The recent forecast of billions of devices, all connected to the Internet and generating low-rate monitoring, measurement, or automation data that many end-users/applications frequently request, signifies the need for applying in-network caching techniques to Internet-of-Things (IoT) traffic. Although time delay is not critically important for small-sized IoT content, the expected total traffic load...
At the University of Rijeka the theoretical knowledge is mainly transferred by the traditional model consisting of professor explaining material to a group of students in front of a blackboard. We believe that this model dates from the period of the industrial revolution when it was necessary to educate large number of people to work on new machines, but there was no technology for more efficient...
Active Queue Management (AQM) design has again come into the spotlight of network operators, vendors and OS developers. This reflects the growing concern and sensitivity about the end-to-end latency perceived by today's Internet users. CoDel and PIE are two AQM mechanisms that have recently been presented and discussed in the IRTF and the IETF as solutions for keeping latency low. To the best of our...
The proliferation of various objects and explosive development of the Internet technologies such as Web of Objects (WoO) have contributed to an increasing demand for multimedia streaming applications. The adaptation of multimedia content according to context information is essential to supporting these applications in the WoO environments. In this study, we design a context-aware adaptive streaming...
With the proliferation of connectivity enabled smartphones and the huge amount of data that everyday users generate through Web 2.0, the Internet is becoming bigger and bigger. The possibility to search for objects and users' profiles is at the base of the Internet of Everything paradigm. Surprisingly, the more we expand our interconnecting possibilities, the more we are interested in local, context-related...
In this paper we explore the feasibility of conducting software training in a peer learning context with the aid of student-produced screen casts. Three case studies were conducted to collect data. Wikispaces and Screencast-O-Matic were used during software training sessions to support peer learning in three Information Systems and Technologies (IST) courses. Screen casts were produced by students...
This paper analyses the existing state-of-the-art implementation of e-learning and collaborative learning systems in Libyan Higher Education. The authors have developed a questionnaire, which was completed by mature Libyan students enrolled for two categories, the first category is a researchers group in UK who also are full-time lecturers at the Universities of Tripoli, Garyounis, Gharian and Ezawia;...
Query by Singing/Humming(QBSH) is to retrieve songs in the music database using user's singing or humming. Open-End Dynamic Time Warping (OEDTW) is one of the methods which are commonly used in QBSH studies. This paper proposes a method for improving OEDTW performance using optimal scaling factor taken from Linear scaling phase. The proposed method finds an optimal global scale of a query for each...
IP Multimedia Subsystem (IMS) is well known for its combination of the capability of universal coverage of mobile network and rich application development environment of IP network. IMS has been welcomed by both industry and academic society, becoming the first choice of the Next Generation Network (NGN) technologies. This paper describes the design and implementation of three IMS teaching lab experiments,...
Currently, computer technology has been widely used in the teaching of higher mathematics, which lead to a revolutionary change to the traditional teaching theory, method, means and structure and has played a positive to promote the effect of higher mathematics teaching. But, there are several imperfections are occurred in the practical process of computer aided teaching. Therefore, it is necessary...
Nondestructive testing (NDT) technology has the advantages of not undermining the test specimens and high detection sensitivity in the flaw detection of the pressure vessel, so it has been widely applied. This paper firstly introduces five conventional methods of the NDT technology to the pressure vessel, namely the Magnetic Particle Testing, the Ultrasonic Testing, the Penetration Testing, the Eddy...
Evolution of economic law is the rebel of the era of post-industrial civilization. The economic law itself as a cultural phenomenon, its vitality is that the spread is inherited. Cultural essence from the civil society, the economic law also gets rid of the grassroots cannot be the same after the processing of the elite for integration, is higher than the reality popularity of low-end, with certain...
Concept based search is a method that enhances information retrieval systems using semantic relationships. The recall in concept based search is relatively low. That low recall comes from the fact that it is not easy to represent a concept completely. Query expansion intends to fill a gap because concept representation is always partial. Query expansion improves the recall. In this paper we present...
In recent years, with the rapid growth of the Internet applications and services, phishing attacks seriously threaten the web security. Due to the versatile and dynamic nature of phishing patterns, the development and maintenance of the anti-phishing prevention system is difficult and costly. Hence, how to acquire and update the phishing knowledge and the phishing model in the anti-phishing detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.