The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Internet connection is essential for daily life, however not all areas are covered by Internet access due to historical reasons. For example, with 3.7 million daily passengers, London underground system has no WiFi or cellular signal provided during travelling due to legacy reasons. Deploy new access infrastructure need to consider the integrating problem with the current environment, also bring a...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
The concept of persistent identification is increasingly important for research data management. At the beginnings it was only considered as a persistent naming mechanism for research datasets, which is achieved by providing an abstraction for addresses of research datasets. However, recent developments in research data management have led persistent identification to move towards a concept which...
The rapid proliferation of devices of the Internet of Things requires a vast network of heterogeneous devices to maintain the ability to communicate rapidly and seamlessly. The transition to delay sensitive Tactile Internet applications would demand on a new information and communications infrastructure. In our previous work, we have proposed a fast Location basEd Source Switching (LESS) mechanism...
The paper considers the technology of finding Internet sources of historical information, taking into account their potential as information fixators of historical events, surveillance and retrospective analysis of events. It touches upon the issue of reliability of the information distributed, its factual and documentary grounds in conditions of information confrontation. It provides the method of...
Authors in the paper consider such definitions as a psychography, psychographic characteristics and their correlation in classical and digital marketing. The role of psychographic characteristics in human behavior in the process of goods search and ordering in a virtual environment is defined. The authors studied the potential of social networks as the main channel for obtaining information about...
The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people's lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial...
The purpose of this study was to explore the important factors that influence users’ continuance usage behavior toward mobile online group-buying. Based on the characteristics of the mobile Internet, an extension of the UTAUT model is introduced to verify the proposed hypotheses. The structural equation modeling method is used to analyze the empirical data which come from universities in China. The...
Domain names and domain name system (DNS) have been used and abused for over 30 years since the 1980s. Although legitimate Internet users rely on domain names as their indispensable infrastructures for using the Internet, attackers use or abuse them as reliable, instantaneous, and distributed attack infrastructure. However, there is a lack of complete understanding of such domain name abuses and the...
DNS is one of the important names in web-based information technology that allows users to be able to browse the desired information. DNS service has some similarities with a list of phone book that stores telephone numbers and addresses. To perform the function, the DNS service configured on a special machine that serves the request is a DNS Server. The reliability and accuracy of a DNS server in...
The increasing use of internet and mobile devices has also facilitated tourists to select various tourism destinations. This study analyzes the factors that influence consumer purchase intention toward online travel packages available on e-marketplace websites. Data collection was conducted via a survey with 441 respondents who were members of online travel communities/forums; the results were processed...
Energy interconnection (EI) is a logical consequence when ideas of open source and distributed scheme from the information field are introduced into the energy field. EI is essentially a typical cyber-physical system. This paper studies the new capabilities in sensing, computation, communication and control by analyzing its characteristics and demand. Firstly, we analyze the system architecture of...
This paper presents an analysis of the relationships between individuals' traits and cohesion in the virtual community environment. Individual traits relate to personal qualities of members of the community where this paper attempts to present their influence over community cohesion. Four research variables were identified to represent the traits of the virtual community members. Experience relates...
The vision of cyber-physical systems (CPSs) considered the Internet as the future communication network for such systems. A challenge with this regard is to provide high communication reliability, especially, for CPSs applications in critical infrastructures. Examples include smart grid applications with reliability requirements between 99–99.9999% [2]. Even though the Internet is a cost effective...
This research aimed to analyze the impact of the competence, work ethic, professionalism and motivation of people (lecturer and staff) on their performance. The data taken from questionnaires to 317 respondents and interviewed the 12 respondents. Data were analyzed using multiple regression analysis. The results showed that the Competence, Work Ethics, Professionalism and Motivation on the lecturer...
As the key to both offline and online business, consumers' trust to retailers always influences their purchase decision. In recent years, based on the traditional business, more and more click and mortar companies spring up. But could consumers' trust transfer from offline to online channel? And how? Extant researches lack deep exploration for these questions. In this study, introducing perceived...
Controlling robots in real-time over a wireless interface present fundamental challenges for forthcoming fifth generation wireless networks. Mission critical real-time applications such as telesurgery over the tactile Internet require a communication link that is both ultra-reliable and low-latency, and that simultaneously serving multiple devices and applications. Wireless performance requirements...
DTN (Delay/Disruption Tolerant Networking) inserts a new layer between the application layer (L7) and the transport layer (L4) for reliable communication on long-delay, intermittent, or lossy inks. Such a new layer, however, should provide not only a single rich service but also various rich services. We are proposing Layer-5 (L5) inserted between L7 and L4 to provide multiple rich services. One of...
The widespread diffusion of mobile phones and the convergence of more and more services to the mobile devices allow the service providers to collect a huge corpus of information about the behaviour of the users (e.g., location and activity), “transforming” the cellular network into a highly distributed and pervasive sensor network. In this paper, we aim at demonstrating how, by using simple statistical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.