The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet live broadcasting services such as USTREAM, TwitCasting have become popular. These services give broadcasters an ability which can broadcast videos via the Internet. By adding video effects and audio effects, live streaming services can realize as if broadcasters were in a different world. In this paper, we call this kind of live streaming 'Different Worlds Broadcasting'. However if many...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
This paper proposes a Domain Name System (DNS) Name Autoconfiguration called DNSNAv4 for Internet-of-Things (IoT) Devices in Internet Protocol (IP) version 4 (IPv4). The manual configuration of domain names of devices might be a cumbersome burden for users as the number of devices increases. A legacy scheme called DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register DNS names...
Advertising is a form of delivering commercial messages. It contributes people to get more acknowledge of a product and persuades the potential consumers to take some action, such as buying, sharing, and registering as a member. With the popularity of Internet technology growing up, there are more and more advertising methods using the Internets to deliver promotional messages. Since the benefits...
Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user's behavior etc. There are several types of attacks...
Internet users are interested in content regardless of its location; however, the current client/server architecture still requires requests to be directed to a specific server. Information-centric networking (ICN) is a recent vein that relaxes this requirement through the use of name-based forwarding, where forwarding decisions are based on content names instead of IP addresses. Despite previous...
Named Data Networking (NDN) uses content names as routing entries, and thus the scalability of NDN routing is of primary concern. NDN allows in-network caching as a built-in functionality; however, if network nodes make caching decisions individually, duplicate copies of the same content may exist among nearby nodes. To address these problems, we propose Coordinated Routing and Caching (CoRC) that...
Internet has witnessed its paramount function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) and Content-Centric Networking (CCN) emerge as a clean slate network architecture to embrace this shift. Pending Interest Table (PIT) in NDN/CCN keeps track of the Interest packets that are received but yet un-responded, which brings NDN/CCN significant features,...
Geo-tweet visualization help users know the events that is happening over the space and time from the tweets or wikipedia while they click on the specified location for a 3D based tag visualization. Normal events are detected by system which happens anywhere or anytime using machine learning algorithm and special events are also extracted by comparing current situation to normal regularities. Generally,...
The notion of the Tactile Internet is burgeoning which permits us to transmit actuation and touch in real-time. With technological advancement, communication comprising of both voice and data which is pushing forward the structure of the current network, haptic communications will be enabled by tactile internet, which in turn will be a fundamental change to the way the global skill sets would be delivered...
Internet is one of the major research areas which provides a new medium of communication that enables to gain access towards the enormous amount of information on a broad variety of topics. Internet Services are available in many of the educational institutions for their working staff members and students. One of the most essential aspect is to find the user behaviors, and the usage of social media...
To make the cities greener, safer, and more efficient, Internet of Things (IoT) can play an important role. Improvement in safety and quality of life can be achieved by connecting devices, vehicles and infrastructure all around in a city. Best technological solutions can be achieved in smart cities by making different stakeholders to work together [5][6][7]. System integrators, network operators and...
User attribution process based on human inherent dynamics and preference is one area of research that is capable of elucidating and capturing human dynamics on the Internet. Prior works on user attribution concentrated on behavioral biometrics, 1-to-1 user identification process without consideration for individual preference and human inherent temporal tendencies, which is capable of providing a...
Due to the rapid increase of the Internet traffic encryption HTTPS, and the newly adopted protocols HTTP2 and SPDY, the need for a comprehensive high-level information extraction tool that supports the new protocols becomes essential for critical applications such as digital and network forensic and web penetration testing. In spite of the availability of big data from the Internet traffic, current...
Internet has turned out to be one of the basic components for getting data in an everyday life. The impact of web is wide and one can't envision a world without it. In such a circumstance, there are parts of the world that doesn't get internet, or regardless of the possibility that they do, they get to be constrained because of powerless signals, unaffordable data cost or legislative confinements...
ere are numerous working projects on IoT platforms, and many projects employ JavaScript as their client-side language. One of the benets using JavaScript in IoT platforms is its great portability, which lets an application to run on any IoT devices that employ a JavaScript runtime. In this situation, user experiences can be enhanced if the states in the IoT devices can be shared so that a user can...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
An increasing number and variety of devices are connected to the Internet. Thus, it is expected that peer-to-peer (P2P) networks, which have no central servers, will solve the server overload issue in the client-server communication model. Among P2P information search schemes, we focus on Skip Graphs, because they exhibit strong churn resilience and have a range search function, which is desirable...
Web of world facilitates search results on massive collection of data using Internet. While obtaining search results corresponding to a particular search query, authentication of search results becomes an important question, as different sources contribute data in every moment which are stored in (un)trusted third party servers. In this paper, we discuss on the authenticated search results of some...
Video on Demand (VoD) services like Netflix and YouTube account for ever increasing fractions of Internet traffic. It is estimated that this fraction will cross 80% in the next three years. Most popular VoD services have recommendation engines which recommend videos to users based on their viewing history, thus introducing time-correlation in user requests. Understanding and modeling this time-correlation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.