The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
HTTP is recognized as the most widely used protocol on the Internet when development of applications is transferred more and more onto the web. Therefore, malicious developers trend to exploit HTTP as a communication media environment to spread forbidden actions. Detection of malicious HTTP communication is a really huge challenging job since the malicious HTTP communication is transparently merged...
In this paper, the solution for interconnecting the videoconference systems into a single videoconference infrastructure is presented. Further its users will be able to make reservations through developed web application. The paper presents complex analysis of technologies related to videoconferencing. Several ways of implementation of the web application while connecting to a central system for videoconference...
Automation has gained the most famous and biggest attention in the industrial world lately. This is because it causes less man involvement, higher accuracy, money and time savings, unlike the conventional methods. Thus, the “Internet of Things” (IoT) concept came to the picture. This research paper reveals an implementing method of IoT concept for a manufacturing line to inspect and control an automatic...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
Pattern recognition is one of the fundamental competencies associated with computational thinking and STEM education. Although much has been written to define computational thinking (CT), we argue that CT is a multi-faceted construct and specific aspects of CT (such as pattern recognition) should be examined. The purpose of this study is to conduct a systematic review of literature on pattern recognition...
Large scale applications in data centers are composed of computers connected with a network. Traditional network switches do not perform routing based on packet contents. Thus, packets cannot be transmitted to the optimal computer for the request which is written in the packet payload. On the other hand, Deeply Programmable Network (DPN) switches can completely analyze packet payloads and perform...
Eye is the main sensing organ in human body, so it contributes much for user interface. Eye tracking has been widely used in Human Computer Interactions. Real time face image capturing along with eye gaze tracking can provide a means of user input to the computer. Here we combine an efficient method for tracking eye and detecting blink to produce an environment by which physically disabled persons...
Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major...
The most important factor to build a synthesized discourse close to human speech, it is important that the content preparing segment delivers a suitable arrangement of phonemic units relating to an the text given as input. A detailed experimental research has been done throughout the project to syllabify Assamese words by using existing Phonetic Alphabet structures for Assamese Language and later...
Emotion expression is an essential function for daily life that can be severely affected some psychological disorders. In this paper we have identified nine motions. We have extracted more than 20 features from natural speech. In this work database used are SAVEE(Surrey audio visual expressed emotion) and BERLIN. The overall experimental results reveals that combination of features values extracted...
Many computer users lack awareness of the connections their computers make to hosts on the Internet. Some realtime tools exist for host-based network monitoring, but they are too complex for average computer users as they require expert knowledge to use and interpret. Connection Cartographer is a tool to let non-expert users visualize geographical information about their network connections in real...
Smart phones have made a major impact on the lives of people leading to substantial improvements in development of mobile applications during the past few years. These days, mobile phones offer numerous capabilities in addition to conventional phone calls. Smart Tourism is one of the areas of Smart City and Smart phone applications that users can use immensely and get benefit from. Mobile tourism...
The basic concept of machine translation is to translate one human language to another human language. Many translation systems have been built using different approaches which have different accuracy levels. In this paper, a work is being proposed for Syntax Based Machine Translation System from English to Hindi language. The Syntax Based Machine Translation System has the goal of incorporating an...
SMS service is a basic feature that has been built into the cell phone, since a function of exchanging messages are practical and easily understood by all mobile phone users, when SMS is used for negative purposes then it can be used as evidence of the law. This applications was designed to help search a text messages as evidence in a crime that use SMS as a medium of communication, This Application...
Chat application is a feature or a program on the Internet to communicate directly among Internet users who are online or who were equally using the internet. Chat applications allow users to communicate even though from a great distance. Therefore, this chat application must be real-time and multi platform to be used by many users. The development of information and communication technologies are...
This paper discusses the design, development and implementation of an cross-platform program, called ENDS (Easy Network Designer Software), which allows to perform network virtualization and remote configuration of MikroTik equipment basic parameters through a graphical interface. The software was written in Java and it uses a MySQL database where the projects are saved. The program was tested by...
We have introduced a system called ASys in a university Java programming course. ASys allows students to self-assess their programming assignments, and it also assists teachers when assessing. After the course, we collected the students opinions with a survey. We report on the results obtained and we provide empirical data about the benefits obtained when the assessment made by teachers is assisted...
When dealing with eventually consistent systems, application developers are often required to write their own conflict resolution algorithms. The aim of this work is to provide an abstraction layer for an eventually consistent database, namely CouchDB, and its client side implementation, PouchDB in a manner which makes it easier for software developers to use. This is achieved through a JavaScript...
Information technology security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. This paper gives an overview of information security management systems. By the end of this paper you should have developed an understanding of: some tactics used by hackers to hack into systems, computers, web servers, android phone, email,...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.