The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust plays an important role in helping social network user make appropriate decision from abundant social information about products. A variety of social review information (e.g. ratings, voting and tags) emerge with the huge number of products on the Web. How they are utilized for searching and finding appropriate item is investigated. In this paper we propose a user credibility calculation method,...
Over the past few years, many scientists have envisioned an Internet generation that will not only provide voice and data communications but can also support Haptic communications. This new Internet dimension can be beneficial for the society by facilitating the development of new technologies and applications that will improve our standards of living. In this study, we propose a novel traffic engineering...
Organizations make extensive use of Big Data to classify and profile users, in order to effectively personalize their online messages. Big Data is also increasingly relied on as a photograph of society, creating expectations of an increasingly more accurate predictive science. Yet, there are systemic challenges in using Big Data as a comprehensive source of information, and there is also public resistance...
The continuous discovery of exploitable vulnerabilitiesin popular applications (e.g., web browsers and documentviewers), along with their heightening protections againstcontrol flow hijacking, has opened the door to an oftenneglected attack strategy—namely, data-only attacks. In thispaper, we demonstrate the practicality of the threat posedby data-only attacks that harness the power of memorydisclosure...
The notion of the Tactile Internet is burgeoning which permits us to transmit actuation and touch in real-time. With technological advancement, communication comprising of both voice and data which is pushing forward the structure of the current network, haptic communications will be enabled by tactile internet, which in turn will be a fundamental change to the way the global skill sets would be delivered...
Internet of Things (IoT) connects a large volume of devices together, via different modes of wired and wireless communication interfaces. The existing transport layer protocols, like TCP and UDP as well as their variants, lack functionality to handle the diverge and heterogeneous communication standards while ensuring the IoT transport requirements like short-lived packet or message transfer, short...
Flow-Aware Networking (FAN), after a few years of limited interest becomes again a promising concept for the Future Internet. In this paper, we present an integrated approach to ensure efficient and reliable transmission in FAN. The proposed solution is based on the central controller, which enhances an operation of particular mechanisms which compose the integrated system. The key mechanisms of the...
The article presents an analysis of the problem of correct network interaction, based on BGP routing protocol. It analyzes the main attacks on information systems, due to the use of this protocol. Scenario of typical attack is presented. Basic measures to prevent information security threats when using the BGP protocol are offered.
IIOT (Industrial Internet of Things) is a technology that combines industrial techniques, “smart sensors” and “smart devices” in a network. Such technology allows memorizing, analyzing and integrating data from all “smart sensors” to a single workspace. As part of IIoT it generally considered “intelligent enterprises” (transport, engineering, processing, etc.) and, in some ways, “intelligent machines”...
The momentum contemplate evaluates the relationship among online social recreations and the e-learning utilization by look at the impact of social, subjective and teaching nearness on e-learning use between female understudies by method for playing on the web social diversions. This study utilizes an exploratory research plan, comfort test procedure. The outcomes propose that all scales are basically...
Internet addiction also called as "internet dependency" is a disorder related to excessive or poorly controlled preoccupations regarding computer use and internet access. Although the advantages of internet are undeniable, however, from the pathological perspective its excessive usage is creating disturbances not only in family and relationships but also in health, academics and memory recall...
This paper aims to study factors influencing trust and purchase intention on the Internet, develop model of trust and purchase intention by empirical data, and analyze path of antecedents influencing purchase intention. This study identifies the factors proposed in the existing social commerce constructs: recommendation and referrals, rating and reviews, forums and communities, together with three...
To ensure the low end-to-end (E2E) delay for tactile internet, short frame structures will be used in 5G systems. As such, transmission errors with finite blocklength channel codes should be considered to guarantee the high reliability requirement. In this paper, we study cross-layer transmission optimization for tactile internet, where both queueing delay and transmission delay are accounted for...
Website quality evaluation is an important research task. Evolution and a growing set of available methods are observed. The article presents the authors' evaluation methodology of the quality of websites named PEQUAL. The formal foundation of the proposed methodology is the broadening of the classical EQUAL method with aspects of preference modelling and evaluation aggregation used in Multi-Criteria...
Internet of Vehicles requires reliable Inter-Vehicular communications. Such a requirement is challenging since the wireless communication channel is very erroneous and lossy in city environments. A lot of solutions for connecting vehicles to the internet have been proposed. However, existing multi-hop gateway discovery solutions do not consider, a key issue, the unreliability of broadcast in city...
The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured on a regular basis. On the other hand, a lot of computing resources in Institute labs, government offices etc. remain underutilized, since they are used for Internet and basic utilities. The aggregation of these underutilized resources can be more than handful to...
In sight of the rapid revolutions of the information and wireless-transformation and telecommunication technologies since 2000s, most of people used to utilize the diversified computer, communication, consumer (3C) electronic devices, such as notebook, tablet PC and so on, to not only simultaneously surf and download the comprehensively public information and knowledge but also immediately share and...
Rateless erasure code (REC) is an erasure code, where the encoder generates a potentially infinite number of encoded symbols and the original message can be reconstructed from a sufficient number of correctly received packets. Many REC-based transmission protocols have been proposed for improving network throughput in lossy channel. However, state-of-the-art RECs (such as LT code and Raptor code)...
The capability to reliably and accurately identify the attacker has long been believed as one of the most effective deterrents to an attack. Ideally, the attribution of cyber attack should be automated from the attack target all the way toward the attack source on the Internet in real-time. Real-time, network-wide attack attribution, however, is every challenging, and many people have doubted whether...
Access to information is predicated on the access to a digital infrastructure. However, access to electricity and the Internet remain elusive for a significant percentage of the world's population, let alone a sustainable access in one’s local language, local context, and relating to local culture. This paper examines the issues of resource constraints, and proposes a framework to classify them. It...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.