The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human behaviors may change over time, but people always tend to preserve their preference. People typically like similar types of contents, for example, movies that they watch in regular intervals with the same amount of interests. On the other hand, the Internet is moving towards a content-oriented structure from the host-oriented structure. Content-Centric Networking (CCN), a content-oriented paradigm,...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
The Internet was designed to support host-oriented services. However, users are typically interested in the content itself rather than the location of the content. As the usage of the Internet for content retrieval is increasing rapidly, some intelligent methods have to be employed in the base stations to provide faster and seamless content delivery. In this paper, we propose a CCN-based fast content...
The provision of Internet connectivity for a vehicle anywhere anytime is an essential element to realize the vision of Connected Car. However, we observe that the current vehicular network technologies mainly focus on single-hop communications having limited coverage for the Internet connectivity. Accordingly, in order to support the always Internet connectivity, multi-hop routing that can cover wider...
This study examines e-Collaboration processes within temporary and ongoing virtual team by analyzing the level gaps of these processes according to the virtual team type. A quantitative test was carried out to compare the means gaps between the two virtual team types in five common collaboration processes. Then, employing a qualitative analysis, we constructed a conceptual model to understand the...
The growth of electronic devices connected to the Internet brings new concerns. These include security, privacy, user rights, data generation, spectrum management, and liability. Countries and organizations are developing policies to accommodate the Internet of Things (IoT). In this paper, we identified IoT indicators useful for policy makers. We considered four categories of indicators. These were:...
The desire of moving from data to intelligence has become a trend that pushes the world we live in today fast forward. Machine learning and data mining techniques are being used as important tools to unlock the wealth of voluminous amounts of data owned by organizations. Despite the existing effort of explaining their underlying machinery in layman's terms, data mining models and their output remain...
The emerging wireless applications have been developed for the enhancement of road transportation safety and efficiency. With the deployment of the Internet of vehicles, the exact improvement of the road efficiency is not studied before. As an effort towards this issue, this paper proposes an analytical model with the perceived radius of vehicles, which ties the connectivity probability of vehicles...
With the successful deployment of wireless networks such as cellular and Wi-Fi networks as well as development of lightweight hand-held devices, wireless communication became the fastest growing sector in communication industry and wireless networks have been part of every business. Over 25 billion devices are expected to be connected to the Internet by 2020. Because of exponentially increasing number...
The development of Information and Communication Technologies (ICT) and the widespread growth of Internet has revolutionized the way of performing commercial operations. Due to this the organizations must reconsider the use of systemic thinking and aim their business models towards more globalized tendencies. All this has helped many companies to see the electronic commerce as a new way of on-line...
In this paper, we present a novel method to classify directions of capital flows in Internet finance. Our method is different from previous text classification methods in that extracts key sentences which may directly reflect the semantics of input text before classification. We use the Bi-LSTM model as a classifier to process input sentences. In this paper, we represent the matrix of key sentences...
Based on the unfolding model of voluntary employee turnover, this paper has investigated the influence of coworker turnover (CT) on stayer turnover intention (TI), the mediating effect of job satisfaction (JS) and the moderating effect of Self-perceived Employability (SPE) for stayer. Data has been collected from 259 employees came from 21 regions. By using hierarchical regression and bootstrapping,...
Internet has become a foundation of our modern society. However, all regions or countries do not have the same Internet access regarding quality especially in the Indian Ocean Area (IOA). To improve this quality it is important to have a deep knowledge of the Internet physical and logical topology and associated performance. However, these knowledges are not shared by Internet service providers. In...
Cyber-attacks have become more threatening as Internet evolves, particularly for Internet Service Providers (ISPs) that play a rule of carrying them to their subscribers. In order to protect themselves and their subscribers, ISPs invest in typical protection systems like IDS, IPS, or Firewalls, that are designed for perimeter-based operation. Even though these expensive systems are efficient to protect...
This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computer criminals on the Internet. This work in progress represents a proposal of a distributed platform (chatbot) that includes a module of attraction of pedophile interest, an intelligent engine of a question-answer analysis, and an automatic characterization of pedophile trends. In order to perform this...
This paper presents a study of mobile device literacy in Senegal within the context of the AppliCafé project. Research in this area has been mostly conducted in Anglophone countries. We designed a kiosk structure that we call AppliCafé (derived from the term cyber café) that can move between locations and is equipped with mobile technology, including training videos and a mobile application. This...
Deep neural networks have advanced many computer vision tasks, because of their compelling capacities to learn from large amount of labeled data. However, their performances are not fully exploited in semantic image segmentation as the scale of training set is limited, where perpixel labelmaps are expensive to obtain. To reduce labeling efforts, a natural solution is to collect additional images from...
The ability of learning from noisy labels is very useful in many visual recognition tasks, as a vast amount of data with noisy labels are relatively easy to obtain. Traditionally, label noise has been treated as statistical outliers, and techniques such as importance re-weighting and bootstrapping have been proposed to alleviate the problem. According to our observation, the real-world noisy labels...
At present time Universidad de Las Américas (UDLA) is processing a huge amount of information between their campuses. An alternative network technology can provide communications to main offices and data center. Wireless networks have limits for area coverage and bit rates including spectrum licensing. FSO technology (Free Space Optics) allows configuring a dedicated link with high bit rates and no...
With the continuing development and innovation of modern information and communication technologies in recent years, social media platforms, such as WeChat and Microblog, have been witnessed to play a key role in employee management for enterprises or organizations, enabling individual or groups of employees to express their viewpoints or report their works in a real-time fashion. The resulting Cyber-workspace...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.