The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The interests of individual Internet users fall into a hierarchical structure which is useful in regards to building personalized searches and recommendations. Most studies on this subject construct the interest hierarchy of a single person from the document perspective. In this study, we constructed the user interest hierarchy via user profiles. We organized 433,397 user interests, referred to here...
The Internet of Things is one of the trending technologies wherein connecting any device to the Internet and control power to any appliance and in addition possess capability of connecting those appliances to each other in creating a network. In this work, a WiFi enabled micro-controller is interfaced with few sensors like ADXL335, a 3-axis accelerometer for sensing tilt of the object, motion, vibration...
The aim of this article is to analyze the use of basic e-government elements by individual users in Poland in 2017. Article presents the results of research highlighting popularity, use and influence of e-government functions that support such application in reality. Seventeen core e-government functions, most popular among respondents, were selected based on prior consultation, being the baseline...
This paper concerns the problem of estimating the Internet flow duration distribution from indirect measurements due to network constraints. The aim is to estimate the distribution from observing: the possible superpositions (collisions) of sampled flow durations, the flow arrivals-to-departures times without identification of sampled flows and the number of sampled flows in progress. For each type...
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
This paper is an extension of my earlier paper [1]. It examines the continuing growth of this problem, and the likelihood that it will continue to get worse. Since the previous paper, the author was contacted by a lawyer involved in litigating a dispute related to TLDs. As noted in the previous paper, misdirected communication has obvious security and privacy ramifications and is an age old problem...
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of...
With the development of Internet e-commerce, shopping online has become very popular. Online stores have the advantage of having more items in their catalogue without worrying about shop constraints. In this scenario, recommendation systems are useful as they can help users in identifying items that they might be interested in. After shopping users usually provide feedback in the form review and ratings...
The clustering of web resources is a significant and difficult task. In previous work has suggested ways to unify web information sources, trying to solve problems like heterogeneity of content, lack of structure, availability, distribution, quantity and quality. However, there are more complex than other domains where the solution is an even more cumbersome problem, due to the quantity and variety...
Denizens of the Internet are coming under a barrage of phishing attacks of increasing frequency and sophistication. Emails accompanied by authentic looking websites are ensnaring users who, unwittingly, hand over their credentials compromising both their privacy and security. Methods such as the blacklisting of these phishing websites become untenable and cannot keep pace with the explosion of fake...
This paper focuses on the concept of car parking detection mechanism using the ultrasonic sensor, in combination with the usage of Internet of Things i.e. sending the status of the parking slot to the Internet. Through which the user at any place in the world can see which parking slot is empty and where to park. This is done by sending the data of ultrasonic sensor through our Wi-Fi module that is...
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource...
An improved KNN text classification algorithm based on Simhash has been proposed by introducing Simhash and the average Hamming distance of adjacent texts as a unit, which solves the problems caused by data imbalance and the large computational overhead in the traditional KNN text classification algorithms. Experimental results demonstrate that the proposed algorithm performs a higher precision, a...
HTTP constitutes a dominant part of the Internet traffic. Today's web traffic mostly consists of HTTP/1 and the much younger HTTP/2. As the traffic of both protocols is increasingly exchanged over encryption, discerning which flows in the network belong to each protocol is getting harder. Identifying flows per protocol is however very important, e.g., for building traffic models for simulations and...
With the popularity of the Internet, online news media are pouring numerous of news reports into the Internet every day. People get lost in the information explosion. Although the existing methods are able to extract news reports according to key words, and aggregate news reports into stories or events, they just list the related reports or events in order. Moreover, they are unable to provide the...
This article aims to address a doctoral research carried out in the senior universities of the district of Castelo Branco in the academic year 2013/2014, whose main objective was to identify the sociocultural factors that influence and condition the option to learn ICT and to know the impacts of this learning on well-being (mental and social) throughout the aging process. Data were collected at 5...
This paper considers the potential motivations of using a social application to make donations to needy families. Mobile devices and their inseparable applications are becoming more and more part of people's daily lives, who spend all their time with their always-on, always connected devices, as close as the body's own clothes. The study conducted, when addressing the social application Solidarius...
The deceitful practice of Typosquatting involves deliberately registering Internet domain names containing typographical errors that primarily target popular domain names, in an effort to redirect users to unintended destinations or steal traffic for monetary gain. Typosquatting has existed for well over two decades and continues to be a credible threat to this day. While much of the prior work has...
This study seeks to assess the impact of photography and social networks, checking how the photographs online are perceived by users of social networks. With the growing use of digital devices with internet access alongside with the democratization of photography, in digital format, it has been noticed an increase in the amount of photographs available online through social networks where the common...
The Internet is rapidly developing toward the next generation of the Internet of Things (IoT), which accelerates the emergence of interconnected network architectures even further. However, the way to design interconnected networks that can meet various changes in environment and service demands remains an important issue that has not been appropriately addressed yet. These interconnected networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.