To see the other types of publications on this topic, follow the link: COMPUTERS / Web / Browsers.

Journal articles on the topic 'COMPUTERS / Web / Browsers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'COMPUTERS / Web / Browsers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Baran, Erkan, Huseyin Çakır, and Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi." International Journal of Human Sciences 12, no. 2 (September 16, 2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.

Full text
Abstract:
<p>Nowadays, web browser tools are seen ıntensıvely durıng the usage of web applıcatıons. Because of that, browsers provıdes ınfrastructure of a largo majorıty of crımes. Because guılty or suspect can use the browsers to collect ınformatıons, to hıde hıs crıme, learn new crımınal methods or to apply they have learned. In thıs study, ıt ıs also seeked answers of how a process can be monıtored on the computers whıch are used on browsers, ın whıch fıles whıch datas are looked and when and whıch sıtes are accessed. Accordıng to research of W3counter web stats tool, Chrome Web browser, whıch has %43 persentage of across the world ın usage, ıs proses as the most demanded browser ın thıs study by users, and ıt ıs scented out ın thıs browser's related fıles. In these days, ''hıdden mode'' whıch take part ın vast majorıty of browsers ıs also examıned. Thıs feature of the browser, whıch ıs receıved reference, ıs tracked by testıng and ıs sought data ın RAM memory and fıle systems. Thus, '' hıdden mode'' effects are dıscussed ın provıdıng studıes about suspect or crımınal posıtıon people, what kınd of data can be obtaıned ın usıng '' hıdden mode” ıs revealed.</p><p> </p><p><strong>Özet</strong></p><p>Günümüzde internet uygulamalarının kullanımı sırasında web tarayıcı araçlarının yoğun bir şekilde kullanımı görülmektedir. Bu nedenle tarayıcılar, işlenen suçların büyük bir çoğunluğuna altyapı sağlar. Çünkü suçlu ya da şüpheli, tarayıcıları bilgi toplamak, suçunu gizlemek, yeni suç metotları öğrenmek ya da öğrendiklerini uygulamak için kullanabilir. Bu çalışmada da tarayıcıların kullanıldığı bilgisayarlar üzerinde bırakılan izlerin tespitinde nasıl bir süreç izlenebileceği, hangi dosyalarda hangi verilere bakılabileceği ve ne zaman hangi sitelere erişim sağlandığı gibi çeşitli sorulara cevaplar aranmaktadır. w3counter adlı internet istatistik aracının yaptığı araştırmaya göre, dünya genelinde %43'lük bir kullanım alanına sahip olan Chrome web tarayıcısı, kullanıcılar tarafından en çok talep gören tarayıcı olarak bu araştırma içinde referans alınmaktadır ve bu tarayıcıya ait ilgili dosyalarda izler sürülmektedir. Ayrıca günümüz tarayıcıların büyük bir çoğunluğunda yer alan “<strong>gizli mod</strong>” özelliği incelenmektedir. Referans alınan tarayıcının bu özelliği test edilerek iz sürülmekte, dosya sistemlerinde ve RAM bellekte veri aranmaktadır.Böylelikle “gizli mod” kullanımında ne tür veriler elde edilebileceği ortaya konarak şüpheli ya da suçlu konumundaki kişilere ait delillendirme çalışmalarında “gizli mod” kullanımının etkileri tartışılmaktadır. </p>
APA, Harvard, Vancouver, ISO, and other styles
2

Choi, Ben. "Knowledge Engineering the Web." International Journal of Machine Learning and Computing 11, no. 1 (January 2021): 68–76. http://dx.doi.org/10.18178/ijmlc.2021.11.1.1016.

Full text
Abstract:
This paper focuses on the largest source of human knowledge: The Web. It presents the state of the art and patented technologies on search engine, automatic organization of webpages, and knowledge-based automatic webpage summarization. For the patented search engine technology, it describes new methods to present search results to the users and through browsers to allow the users to customize and organize webpages. For the patented classification technology, it describes new methods to automatically organize webpages into categories. For the knowledge-based summarization technology, it presents new technics for computers to "read" webpages and then to "write" a summary by creating new sentences to describe the contents of the webpages. These search engine, classification, and summarization technologies build a strong framework for knowledge engineering the Web.
APA, Harvard, Vancouver, ISO, and other styles
3

Sendra, Sandra, Ana Isabel Túnez-Murcia, Jaime Lloret, and Jose Miguel Jiménez. "Network Performance in HTML5 Video Connections." Network Protocols and Algorithms 10, no. 3 (January 6, 2019): 43. http://dx.doi.org/10.5296/npa.v10i3.13933.

Full text
Abstract:
Currently, most of remote education systems use video streaming as the main basis to support teaching. These emissions can be seen in devices with different hardware features such as personal computers, tablets or smartphones through networks with different capacities. The use of different web browsers and coding options can also influence the network performance. Therefore, the quality of the video displayed may be different. This work presents a practical study to establish the best combination of web browsers and containers to encode multimedia files for videos streaming in personal computers running Windows 7 and Windows 10 operating systems. For this, a video encoded with different codecs and compressed with different containers have been transmitted through a 1000BaseT network. Finally, the results are analyzed and compared to determine which would be the most efficient combination of parameters according to the resolution of the transmitted video.
APA, Harvard, Vancouver, ISO, and other styles
4

Areshchankau, I. S. "Development of the learning game environment "Bukashka" ("Ladyb ug") Using client web technologies." Informatics in school, no. 6 (September 25, 2021): 32–38. http://dx.doi.org/10.32517/2221-1993-2021-20-6-32-38.

Full text
Abstract:
The theme "Algorithmization and programming" is one of the most difficult in the school informatics course. The computer programs that implement models of microworlds in which virtual actors operate help to explain the basic concepts of this theme for schoolchildren.The best visualization can be achieved using learning environments with drawing actors. The learning environment "Kangaroo Ru" provides the most simple model. It was developed in the early 1990s as a part of an educational project for IBM PS/2 computers running the DOS operating system.The usage of "Kangaroo Ru" is fraught with difficulties on modern computers. This article describes a case of the learning environment that is "Kangaroo Ru" compatible, but is implemented using web technologies HTML, CSS and JavaScript. It is runnable in web browsers of a wide range of hardware platforms.
APA, Harvard, Vancouver, ISO, and other styles
5

McGraw, Kenneth O., Mark D. Tew, and John E. Williams. "The Integrity of Web-Delivered Experiments: Can You Trust the Data?" Psychological Science 11, no. 6 (November 2000): 502–6. http://dx.doi.org/10.1111/1467-9280.00296.

Full text
Abstract:
Data from Web-delivered experiments conducted in browsers by remote users of PsychExperiments, a public on-line psychology laboratory, reveal experiment effects that mirror lab-based findings, even for experiments that require nearly millisecond accuracy of displays and responses. Textbook results are obtained not just for within-subjects effects, but for between-subjects effects as well. These results suggest that existing technology is adequate to permit Web delivery of many cognitive and social psychological experiments and that the added noise created by having participants in different settings using different computers is easily compensated for by the sample sizes achievable with Web delivery.
APA, Harvard, Vancouver, ISO, and other styles
6

Abriata, Luciano A. "Building blocks for commodity augmented reality-based molecular visualization and modeling in web browsers." PeerJ Computer Science 6 (February 17, 2020): e260. http://dx.doi.org/10.7717/peerj-cs.260.

Full text
Abstract:
For years, immersive interfaces using virtual and augmented reality (AR) for molecular visualization and modeling have promised a revolution in the way how we teach, learn, communicate and work in chemistry, structural biology and related areas. However, most tools available today for immersive modeling require specialized hardware and software, and are costly and cumbersome to set up. These limitations prevent wide use of immersive technologies in education and research centers in a standardized form, which in turn prevents large-scale testing of the actual effects of such technologies on learning and thinking processes. Here, I discuss building blocks for creating marker-based AR applications that run as web pages on regular computers, and explore how they can be exploited to develop web content for handling virtual molecular systems in commodity AR with no more than a webcam- and internet-enabled computer. Examples span from displaying molecules, electron microscopy maps and molecular orbitals with minimal amounts of HTML code, to incorporation of molecular mechanics, real-time estimation of experimental observables and other interactive resources using JavaScript. These web apps provide virtual alternatives to physical, plastic-made molecular modeling kits, where the computer augments the experience with information about spatial interactions, reactivity, energetics, etc. The ideas and prototypes introduced here should serve as starting points for building active content that everybody can utilize online at minimal cost, providing novel interactive pedagogic material in such an open way that it could enable mass-testing of the effect of immersive technologies on chemistry education.
APA, Harvard, Vancouver, ISO, and other styles
7

Gabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.

Full text
Abstract:
AbstractWeb-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browser version number or screen resolution). Minor changes in the input values generate a completely different fingerprint hash, making it impossible to find similar ones in the database. On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices. This weak point is commonly exploited by fraudsters who knowingly evade this form of protection by deliberately changing the value of device parameters. The paper presents methods that significantly limit this type of activity. New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account. The fingerprint generation methods are based on popular Minhash, the LSH, and autoencoder methods. The effectiveness of coding and comparing each of the presented methods was also examined in comparison with the currently used hash generation method. Authentic data of the devices and browsers of users visiting 186 different websites were collected for the research.
APA, Harvard, Vancouver, ISO, and other styles
8

Łasocha, Wojciech, and Marcin Badurowicz. "Comparison of WebSocket and HTTP protocol performance." Journal of Computer Sciences Institute 19 (June 30, 2021): 67–74. http://dx.doi.org/10.35784/jcsi.2452.

Full text
Abstract:
The aim of the author of this article is analyze the performance of WebSocket and HTTP protocol and their comparison. For this purpose, was used equipment working in a local network consisting of server, two client computers, switch and self-created research web application. Using a test application was measured time of data transfer between clients and server as well server and clients. The tests included transmission 100-character texts in specified number of copies considering speed of hardware (laptops) and software (web browsers). Additionally, was investigated the impact of overhead and TLS encryption to performance. The obtained results have illustrated in the form of charts, discussed and appropriate conclusions drawn.
APA, Harvard, Vancouver, ISO, and other styles
9

Cherckesova, Larisa, Alexandr Zelensky, Elena Revyakina, Olga Safaryan, and Denis Korochentsev. "Development of safety monitor from destructive influences of web–sites and social networks of internet." E3S Web of Conferences 273 (2021): 08046. http://dx.doi.org/10.1051/e3sconf/202127308046.

Full text
Abstract:
This article discusses the main age-related features of the Internet use by adolescents and children. Today more and more computers are connected to the Internet. At the same time, connection via high-speed channels is becoming more common, both at work and at home. More and more children get the opportunity to work on the Internet. But at the same time, the problem of ensuring the safety of children on the Internet is becoming more acute. For this, a security monitor was developed, which has many functions that allow you to use the Internet more safely and under parental control. This security monitor is written in the web programming language JavaScript and PHP, which will allow using the system on almost all modern browsers and on any computer. The article also provides screenshots of the program's operation and a flowchart with a detailed description.
APA, Harvard, Vancouver, ISO, and other styles
10

Zunino, Alejandro, Guillermo Velázquez, Juan Pablo Celemín, Cristian Mateos, Matías Hirsch, and Juan Manuel Rodriguez. "Evaluating the Performance of Three Popular Web Mapping Libraries: A Case Study Using Argentina’s Life Quality Index." ISPRS International Journal of Geo-Information 9, no. 10 (September 29, 2020): 563. http://dx.doi.org/10.3390/ijgi9100563.

Full text
Abstract:
Recent Web technologies such as HTML5, JavaScript, and WebGL have enabled powerful and highly dynamic Web mapping applications executing on standard Web browsers. Despite the complexity for developing such applications has been greatly reduced by Web mapping libraries, developers face many choices to achieve optimal performance and network usage. This scenario is even more complex when considering different representations of geographical data (raster, raw data or vector) and variety of devices (tablets, smartphones, and personal computers). This paper compares the performance and network usage of three popular JavaScript Web mapping libraries for implementing a Web map using different representations for geodata, and executing on different devices. In the experiments, Mapbox GL JS achieved the best overall performance on mid and high end devices for displaying raster or vector maps, while OpenLayers was the best for raster maps on all devices. Vector-based maps are a safe bet for new Web maps, since performance is on par with raster maps on mid-end smartphones, with significant less network bandwidth requirements.
APA, Harvard, Vancouver, ISO, and other styles
11

Polyakov, K. Yu. "Using Blockly visual programming language for controlling virtual robots." Informatics in school 1, no. 1 (March 18, 2021): 20–25. http://dx.doi.org/10.32517/2221-1993-2021-20-1-20-25.

Full text
Abstract:
The article describes a new learning programming environment that makes it possible to control Robot, Aquarius, and Turtle virtual robots by means of Blockly visual programming language. The environment is a set of freely available web applications hosted in Internet. Such an approach provides for workability under all modern browsers both on desktop computers and mobile devices. Automatic verification of the correctness of problem solutions is available for all the virtual robots. Suboptimal solutions that use excessive number of blocks receive a lower score due to the rating system (from one to five "stars"). Offline version is available, which can work in local mode without access to Internet. Users can develop and distribute their own sets of problems for all virtual robots.
APA, Harvard, Vancouver, ISO, and other styles
12

Korečko, Štefan, Marián Hudák, Branislav Sobota, Martin Sivý, Matúš Pleva, and William Steingartner. "Experimental Performance Evaluation of Enhanced User Interaction Components for Web-Based Collaborative Extended Reality." Applied Sciences 11, no. 9 (April 23, 2021): 3811. http://dx.doi.org/10.3390/app11093811.

Full text
Abstract:
COVID-19-related quarantine measures resulted in a significant increase of interest in online collaboration tools. This includes virtual reality (VR) or, in more general term, extended reality (XR) solutions. Shared XR allows for activities such as presentations, training of personnel or therapy to take place in a virtual space instead of a real one. To make online XR as accessible as possible, a significant effort has been put into the development of solutions that can run directly in web browsers. One of the most recognized solutions is the A-Frame software framework, created by Mozilla VR team and supporting most of the contemporary XR hardware. In addition, an extension called Networked-Aframe allows multiple users to share virtual environments, created using A-Frame, in real time. In this article, we introduce and experimentally evaluate three components that extend the functionality of A-Frame and Networked-Aframe. The first one extends Networked-Aframe with the ability to monitor and control users in a shared virtual scene. The second one implements six degrees of freedom motion tracking for smartphone-based VR headsets. The third one brings hand gesture support to the Microsoft HoloLens holographic computer. The evaluation was performed in a dedicated local network environment with 5, 10, 15 and 20 client computers. Each computer represented one user in a shared virtual scene. Since the experiments were carried out with and without the introduced components, the results presented here can also be regarded as a performance evaluation of A-Frame and Networked-Aframe themselves.
APA, Harvard, Vancouver, ISO, and other styles
13

Ho, Susanna S. Y., S. M. Lui, and Will W. K. Ma. "Acceptance of Internet Content Filters: An Empirical Study." International Journal of Information Technology & Decision Making 02, no. 03 (September 2003): 477–96. http://dx.doi.org/10.1142/s021962200300077x.

Full text
Abstract:
Content filters empower users to make choices about what can be downloaded from the World Wide Web. At home, parents can restrict what their children can and cannot see on the Internet. This can protect the young web surfers from unpleasant experiences. These tools allow the parents to understand electronic content by means of open and objective content labels. Web surfers may be unwittingly exposed to suggestive and explicit content. Many organizations across the globe, such as ICRA and GBDe, are working on content rating systems and software filters for the Internet. Generally, simple filters are bundled with common browsers. People are not motivated to buy commercial filters with more functionality. Also, there are few studies investigating a consumer's willingness and intention to adopt these tools. This paper presents an exploratory study of the acceptance of Internet content filters in publicly accessed computers. The relationship between demographic factors, such as gender and age, and perception factors, such as severity of Internet problems, are examined. Results show that the acceptance of blocking filters is significantly related to demographic factors and perceptions of the Internet. We discuss implications of the findings, from both the academic and applied perceptive.
APA, Harvard, Vancouver, ISO, and other styles
14

Tse, William T., Kevin K. Duh, and Morris Kletzel. "A Low-Cost, Open-Source Informatics Framework for Clinical Trials and Outcomes Research." Blood 118, no. 21 (November 18, 2011): 4763. http://dx.doi.org/10.1182/blood.v118.21.4763.4763.

Full text
Abstract:
Abstract Abstract 4763 Data collection and analysis in clinical studies in hematology often require the use of specialized databases, which demand extensive information technology (IT) support and are expensive to maintain. With the goal of reducing the cost of clinical trials and promoting outcomes research, we have devised a new informatics framework that is low-cost, low-maintenance, and adaptable to both small- and large-scale clinical studies. This framework is based on the idea that most clinical data are hierarchical in nature: a clinical protocol typically entails the creation of sequential patient files, each of which documents multiple encounters, during which clinical events and data are captured and tagged for later retrieval and analysis. These hierarchical trees of clinical data can be easily stored in a hypertext mark-up language (HTML) document format, which is designed to represent similar hierarchical data on web pages. In this framework, the stored clinical data will be structured according to a web standard called Document Object Model (DOM), for which powerful informatics techniques have been developed to allow efficient retrieval and collation of data from the HTML documents. The proposed framework has many potential advantages. The data will be stored in plain text files in the HTML format, which is both human and machine readable, hence facilitating data exchange between collaborative groups. The framework requires only a regular web browser to function, thereby easing its adoption in multiple institutions. There will be no need to set up or maintain a relational database for data storage, thus minimizing data fragmentation and reducing the demand for IT support. Data entry and analysis will be performed mostly on the client computer, requiring the use of a backend server only for central data storage. Utility programs for data management and manipulation will be written in Javascript and JQuery, computer languages that are free, open-source and easy to maintain. Data can be captured, retrieved, and analyzed on different devices, including desktop computers, tablets or smart phones. Encryption and password protection can be applied in document storage and data transmission to ensure data security and HIPPA compliance. In a pilot project to implement and test this informatics framework, we designed prototype programming modules to perform individual tasks commonly encountered in clinical data management. The functionalities of these modules included user-interface creation, patient data entry and retrieval, visualization and analysis of aggregate results, and exporting and reporting of extracted data. These modules were used to access simulated clinical data stored in a remote server, employing standard web browsers available on all desktop computers and mobile devices. To test the capability of these modules, benchmark tests were performed. Simulated datasets of complete patient records, each with 1000 data items, were created and stored in the remote server. Data were retrieved via the web using a gzip compressed format. Retrieval of 100, 300, 1000 such records took only 1.01, 2.45, and 6.67 seconds using a desktop computer via a broadband connection, or 3.67, 11.39, and 30.23 seconds using a tablet computer via a 3G connection. Filtering of specific data from the retrieved records was equally speedy. Automated extraction of relevant data from 300 complete records for a two-sample t-test analysis took 1.97 seconds. A similar extraction of data for a Kaplan-Meier survival analysis took 4.19 seconds. The program allowed the data to be presented separately for individual patients or in aggregation for different clinical subgroups. A user-friendly interface enabled viewing of the data in either tabular or graphical forms. Incorporation of a new web browser technique permitted caching of the entire dataset locally for off-line access and analysis. Adaptable programming allowed efficient export of data in different formats for regulatory reporting purposes. Once the system was set up, no further intervention from IT department was necessary. In summary, we have designed and implemented a prototype of a new informatics framework for clinical data management, which should be low-cost and highly adaptable to various types of clinical studies. Field-testing of this framework in real-life clinical studies will be the next step to demonstrate its effectiveness and potential benefits. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
15

Yuan, Ye, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, and Tsuyoshi Takagi. "Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms." Security and Communication Networks 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/9846168.

Full text
Abstract:
Quantum computers have the potential to solve some difficult mathematical problems efficiently and thus will inevitably exert a more significant impact on the traditional asymmetric cryptography. The National Institute of Standards and Technology (NIST) has opened a formal call for the submission of proposals of quantum-resistant public-key cryptographic algorithms to set the next-generation cryptography standards. Compared to powerful machines with ample amount of hardware resources such as racks of servers and IoT devices, including the massive number of microcontrollers, smart terminals, and sensor nodes with limited computing capacity, should also have some postquantum cryptography features for security and privacy. To ensure the correct execution of encryption algorithms on any platforms, the portability of implementation becomes more important. As distinguished from C/C++, JavaScript is a popular cross-platform language that can be used for the web applications and some hardware platforms directly, and it could be one of the solutions of portability. Therefore, we investigate and implement several recent lattice-based encryption schemes and public-key exchange protocols including Lizard, ring-Lizard, Kyber, Frodo, and NewHope in JavaScript, which are the active candidates of postquantum cryptography due to their applicabilities and efficiencies. We show and compare the performance of our JavaScript implementation on web browsers, embedded device Tessel2, Android phone, and several JavaScript-enabled platforms on PC and Mac. Our work shows that implementing lattice-based cryptography on JavaScript-enabled platforms is achievable and results in desirable portability.
APA, Harvard, Vancouver, ISO, and other styles
16

Bath, Jon. "Artistic Research Creation for Publicly Engaged Scholarship." KULA: Knowledge Creation, Dissemination, and Preservation Studies 3 (February 27, 2019): 6. http://dx.doi.org/10.5334/kula.10.

Full text
Abstract:
In this paper I discuss the adoption of artistic research creation methodologies, the creation and exhibition of artistic works closely aligned with scholarly research, as a way to increase public engagement with academic research. I begin by discussing the need for scholars to consider the ‘public first’ when developing research communication plans, and draw upon the emergence of ‘mobile first’ interface design as a metaphor. With mobile first development, also known as progressive enhancement, ‘You start by establishing a basic level of user experience that all browsers will be able to provide when rendering your web site,’ but you also build in more advanced functionality that will automatically be available to devices, such as desktop computers (W3C 2015). I argue that we need to prioritize public first research outputs if we are truly serious about engaging the public in our research. I then move into a discussion of various research creation methodologies and explain how they are similar to, and differ from, critical making, another emergent humanities research practice that is based upon the making of physical objects. Finally I provide examples of successful research creation activities, including some related to my current SSHRC-funded project, The Post-Digital Book Arts.
APA, Harvard, Vancouver, ISO, and other styles
17

Andersen, Steven Arild Wuyts. "Cross-platform digital assessment forms for evaluating surgical skills." Journal of Educational Evaluation for Health Professions 12 (April 17, 2015): 13. http://dx.doi.org/10.3352/jeehp.2015.12.13.

Full text
Abstract:
A variety of structured assessment tools for use in surgical training have been reported, but extant assessment tools often employ paper-based rating forms. Digital assessment forms for evaluating surgical skills could potentially offer advantages over paper-based forms, especially in complex assessment situations. In this paper, we report on the development of cross-platform digital assessment forms for use with multiple raters in order to facilitate the automatic processing of surgical skills assessments that include structured ratings. The FileMaker 13 platform was used to create a database containing the digital assessment forms, because this software has cross-platform functionality on both desktop computers and handheld devices. The database is hosted online, and the rating forms can therefore also be accessed through most modern web browsers. Cross-platform digital assessment forms were developed for the rating of surgical skills. The database platform used in this study was reasonably priced, intuitive for the user, and flexible. The forms have been provided online as free downloads that may serve as the basis for further development or as inspiration for future efforts. In conclusion, digital assessment forms can be used for the structured rating of surgical skills and have the potential to be especially useful in complex assessment situations with multiple raters, repeated assessments in various times and locations, and situations requiring substantial subsequent data processing or complex score calculations.
APA, Harvard, Vancouver, ISO, and other styles
18

Niakanlahiji, Amirreza, and Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense." Security and Communication Networks 2019 (May 14, 2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.

Full text
Abstract:
Existing mitigation techniques for cross-site scripting attacks have not been widely adopted, primarily due to imposing impractical overheads on developers, Web servers, or Web browsers. They either enforce restrictive coding practices on developers, fail to support legacy Web applications, demand browser code modification, or fail to provide browser backward compatibility. Moving target defense (MTD) is a novel proactive class of techniques that aim to defeat attacks by imposing uncertainty in attack reconnaissance and planning. This uncertainty is achieved by frequent and random mutation (randomization) of system configuration in a manner that is not traceable (predictable) by attackers. In this paper, we present WebMTD, a proactive moving target defense mechanism that thwarts various kinds of cross-site scripting (XSS) attacks on Web applications. Relying on built-in features of modern Web browsers, WebMTD randomizes values of certain attributes of Web elements to differentiate the application code from the injected code and disallow its execution; this is done without requiring Web developer involvement or browser code modification. Through rigorous evaluation, we show that WebMTD has very a low performance overhead. Also, we argue that our technique outperforms all competing approaches due to its broad effectiveness, transparency, backward compatibility, and low overhead.
APA, Harvard, Vancouver, ISO, and other styles
19

Leith, Douglas J. "Web Browser Privacy: What Do Browsers Say When They Phone Home?" IEEE Access 9 (2021): 41615–27. http://dx.doi.org/10.1109/access.2021.3065243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gannouni, Sofien, Nourah Alangari, Hassan Mathkour, Hatim Aboalsamh, and Kais Belwafi. "BCWB." International Journal on Semantic Web and Information Systems 13, no. 2 (April 2017): 55–73. http://dx.doi.org/10.4018/ijswis.2017040104.

Full text
Abstract:
Web access and web resources open many horizons, their usage increases in all life aspects including government, education, commerce and entertainment, where the key to such resources lies in Web browsers. Acknowledging the importance of universal accessibility to web resources, the W3C has developed a series of guidelines into a Web Accessibility Initiative (WAI), with the goal of providing access to web resources for people with disabilities. In order to bridge the gap in the digital divide between the disabled and the non-disabled people, the authors believe that the development of novel assistive technologies using new human-computer interfaces will go a long way towards achieving this lofty goal. In this paper, they present a P300 Electroencephalography Brain-controlled Web browser to enhance the accessibility of people with severe motor disabilities to Web resources. It enhances their interaction with the Web taking their needs into account. The proposed Web browser satisfies the Mankoff's requirements of a system that would “allow true web access.”
APA, Harvard, Vancouver, ISO, and other styles
21

Xu, Zhen, and James Miller. "An Automated Testing Framework for Cross-Browser Visual Incompatibility Detection." Journal of Applied Intelligent System 3, no. 1 (August 3, 2018): 1–12. http://dx.doi.org/10.33633/jais.v3i1.1809.

Full text
Abstract:
Due to the rapid evolution of web applications and computer techniques, visual incompatibility of web pages has become a problem across different browsers and platforms influencing the functionality of the web applications. At the present, researchers have made progress to address such issues; in addition, many commercial tools have emerged as well. However, drawbacks still exist in the existing work, where fully automate testing at the system level is still not achieved. In this paper, we attempt to propose a framework to detect the cross browser visual incompatibilities automatically. Highlights of the proposed framework include template based case organization, version based automation, and similarity embedded incompatibilities identification.
APA, Harvard, Vancouver, ISO, and other styles
22

Berdak, Przemysław, and Małgorzata Plechawska-Wójcik. "Performance analysis of Unity3D engine in the context of applications run in web browsers." Journal of Computer Sciences Institute 5 (December 30, 2017): 167–73. http://dx.doi.org/10.35784/jcsi.616.

Full text
Abstract:
The aim of the work is the performance analysis of the Unity3D engine in the contex of applications running with a web browser and WebGL technology.. The paper presents literature review was carried out in the scope of creating multimedia applications run in web browsers, graphics engines and WebGL technology . Additionally, technical issues related with converting Unity3D application to WebGL technology are discussed. The research are performed based on computer simulations with five scenes created with Unity3D environment, which include the main capabilities of this engine. Finally, it was presented the results of these studies and the conclusions.
APA, Harvard, Vancouver, ISO, and other styles
23

Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (February 15, 2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.

Full text
Abstract:
Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.
APA, Harvard, Vancouver, ISO, and other styles
24

Vildanov, A. N. "Modeling of stereometric figures in a browser using WebGL." Informatics in school 1, no. 9 (December 1, 2020): 22–27. http://dx.doi.org/10.32517/2221-1993-2020-19-9-22-27.

Full text
Abstract:
The article is devoted to WebGL technology. Previously, web browsers could only display simple graphics using а processor. Today's adopted hardware acceleration support allows browsers to access the computer's GPU to render increasingly complex 3D graphics. To facilitate working with WebGL, you can use ready-made libraries, for example three.js. Thе article provides an overview of the three.js library tools for creating 3D shapes in the browser. Snippets of JavaScript code that implement basic 3D primitives are provided. Ways to apply textures are shown.The results presented in the article will be useful to teachers of informatics when used in additional classes or when organizing project and research activities of schoolchildren in informatics. Students will be able to familiarize themselves with the promising JavaScript language and gain basic 3D modeling skills.
APA, Harvard, Vancouver, ISO, and other styles
25

Fabisiak, Tomasz, and Arkadiusz Danilecki. "Browser-based Harnessing of Voluntary Computational Power." Foundations of Computing and Decision Sciences 42, no. 1 (February 1, 2017): 3–42. http://dx.doi.org/10.1515/fcds-2017-0001.

Full text
Abstract:
AbstractComputers connected to internet represent an immense computing power, mostly unused by their owners. One way to utilize this public resource is via world wide web, where users can share their resources using nothing more except their browsers. We survey the techniques employing the idea of browser-based voluntary computing (BBVC), discuss their commonalities, recognize recurring problems and their solutions and finally we describe a prototype implementation aiming at efficient mining of voluntary-contributed computing power.
APA, Harvard, Vancouver, ISO, and other styles
26

RAJLICH, VÁCLAV, and SRIKANT VARADARAJAN. "USING THE WEB FOR SOFTWARE ANNOTATIONS." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 55–72. http://dx.doi.org/10.1142/s021819409900005x.

Full text
Abstract:
The purpose of software redocumention is to recover comprehension of software and to record it for future use. This paper describes Partitioned Annotations of Software (PAS), where comprehension is recorded in hypertext and browsed by web browsers. The annotations for each code component are partitioned in order to keep different explanations separate, leverage the advantages of hypertext, and better support the processes of program comprehension. The paper describes a tool that parses code and generates PAS skeletons. The paper also describes a process of incremental redocumentation where comprehension of software is recorded incrementally during normal maintenance. The experience with PAS in an industrial project is summarized.
APA, Harvard, Vancouver, ISO, and other styles
27

Purkait, Swapan. "Examining the effectiveness of phishing filters against DNS based phishing attacks." Information & Computer Security 23, no. 3 (July 13, 2015): 333–46. http://dx.doi.org/10.1108/ics-02-2013-0009.

Full text
Abstract:
Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.
APA, Harvard, Vancouver, ISO, and other styles
28

Lineberger, R. Daniel, Paul Sittler, Ernie Frank, and Sam Cotner. "DELIVERING HORTICULTURAL INFORMATION VIA THE INTERNET ON A MOSAIC-BASED INFORMATION SERVER." HortScience 30, no. 3 (June 1995): 444d—444. http://dx.doi.org/10.21273/hortsci.30.3.444d.

Full text
Abstract:
Aggie Horticulture (http://aggie-horticulture.tamu.edu) is the information server of the Texas horticulture program. Contents include information of interest to Texas A&M students and faculty, faculty members at other universities, extension programs at the state and county level, members of the horticultural industries, and the consuming public. Aggie Horticulture is a registered server on the World Wide Web that can be accessed by any networked computer on the Internet that is running “browser” software such as Mosaic or Netscape. Modem access is gained using Internet connections provided through PPP or SLIP connections. Web browsers will change dramatically the way extension provides information to horticultural industries and the consuming public. Techniques for organizing a server and the challenges associated with maintaining a server for world access are discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Anastasiadi, M., E. Bragin, P. Biojoux, A. Ahamed, J. Burgin, K. de Castro Cogle, S. Llaneza-Lago, et al. "CRAMER: a lightweight, highly customizable web-based genome browser supporting multiple visualization instances." Bioinformatics 36, no. 11 (February 28, 2020): 3556–57. http://dx.doi.org/10.1093/bioinformatics/btaa146.

Full text
Abstract:
Abstract Summary In recent years, the ability to generate genomic data has increased dramatically along with the demand for easily personalized and customizable genome browsers for effective visualization of diverse types of data. Despite the large number of web-based genome browsers available nowadays, none of the existing tools provides means for creating multiple visualization instances without manual set up on the deployment server side. The Cranfield Genome Browser (CRAMER) is an open-source, lightweight and highly customizable web application for interactive visualization of genomic data. Once deployed, CRAMER supports seamless creation of multiple visualization instances in parallel while allowing users to control and customize multiple tracks. The application is deployed on a Node.js server and is supported by a MongoDB database which stored all customizations made by the users allowing quick navigation between instances. Currently, the browser supports visualizing a large number of file formats for genome annotation, variant calling, reads coverage and gene expression. Additionally, the browser supports direct Javascript coding for personalized tracks, providing a whole new level of customization both functionally and visually. Tracks can be added via direct file upload or processed in real-time via links to files stored remotely on an FTP repository. Furthermore, additional tracks can be added by users via simple drag and drop to an existing visualization instance. Availability and implementation CRAMER is implemented in JavaScript and is publicly available on GitHub on https://github.com/FadyMohareb/cramer. The application is released under an MIT licence and can be deployed on any server running Linux or Mac OS. Contact f.mohareb@cranfield.ac.uk Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
30

Belcore, Elena, Stefano Angeli, Elisabetta Colucci, Maria Angela Musci, and Irene Aicardi. "Precision Agriculture Workflow, from Data Collection to Data Management Using FOSS Tools: An Application in Northern Italy Vineyard." ISPRS International Journal of Geo-Information 10, no. 4 (April 7, 2021): 236. http://dx.doi.org/10.3390/ijgi10040236.

Full text
Abstract:
In the past decades, technology-based agriculture, also known as Precision Agriculture (PA) or smart farming, has grown, developing new technologies and innovative tools to manage data for the whole agricultural processes. In this framework, geographic information, and spatial data and tools such as UAVs (Unmanned Aerial Vehicles) and multispectral optical sensors play a crucial role in the geomatics as support techniques. PA needs software to store and process spatial data and the Free and Open Software System (FOSS) community kept pace with PA’s needs: several FOSS software tools have been developed for data gathering, analysis, and restitution. The adoption of FOSS solutions, WebGIS platforms, open databases, and spatial data infrastructure to process and store spatial and nonspatial acquired data helps to share information among different actors with user-friendly solutions. Nevertheless, a comprehensive open-source platform that, besides processing UAV data, allows directly storing, visualising, sharing, and querying the final results and the related information does not exist. Indeed, today, the PA’s data elaboration and management with a FOSS approach still require several different software tools. Moreover, although some commercial solutions presented platforms to support management in PA activities, none of these present a complete workflow including data from acquisition phase to processed and stored information. In this scenario, the paper aims to provide UAV and PA users with a FOSS-replicable methodology that can fit farming activities’ operational and management needs. Therefore, this work focuses on developing a totally FOSS workflow to visualise, process, analyse, and manage PA data. In detail, a multidisciplinary approach is adopted for creating an operative web-sharing tool able to manage Very High Resolution (VHR) agricultural multispectral-derived information gathered by UAV systems. A vineyard in Northern Italy is used as an example to show the workflow of data generation and the data structure of the web tool. A UAV survey was carried out using a six-band multispectral camera and the data were elaborated through the Structure from Motion (SfM) technique, resulting in 3 cm resolution orthophoto. A supervised classifier identified the phenological stage of under-row weeds and the rows with a 95% overall accuracy. Then, a set of GIS-developed algorithms allowed Individual Tree Detection (ITD) and spectral indices for monitoring the plant-based phytosanitary conditions. A spatial data structure was implemented to gather the data at canopy scale. The last step of the workflow concerned publishing data in an interactive 3D webGIS, allowing users to update the spatial database. The webGIS can be operated from web browsers and desktop GIS. The final result is a shared open platform obtained with nonproprietary software that can store data of different sources and scales.
APA, Harvard, Vancouver, ISO, and other styles
31

Picazo-Sanchez, Pablo, Juan Tapiador, and Gerardo Schneider. "After you, please: browser extensions order attacks and countermeasures." International Journal of Information Security 19, no. 6 (November 21, 2019): 623–38. http://dx.doi.org/10.1007/s10207-019-00481-8.

Full text
Abstract:
AbstractBrowser extensions are small applications executed in the browser context that provide additional capabilities and enrich the user experience while surfing the web. The acceptance of extensions in current browsers is unquestionable. For instance, Chrome’s official extension repository has more than 63,000 extensions, with some of them having more than 10M users. When installed, extensions are pushed into an internal queue within the browser. The order in which each extension executes depends on a number of factors, including their relative installation times. In this paper, we demonstrate how this order can be exploited by an unprivileged malicious extension (i.e., one with no more permissions than those already assigned when accessing web content) to get access to any private information that other extensions have previously introduced. We propose a solution that does not require modifying the core browser engine, since it is implemented as another browser extension. We prove that our approach effectively protects the user against usual attackers (i.e., any other installed extension) as well as against strong attackers having access to the effects of all installed extensions (i.e., knowing who did what). We also prove soundness and robustness of our approach under reasonable assumptions.
APA, Harvard, Vancouver, ISO, and other styles
32

Mahlous, Ahmed, and Houssam Mahlous. "Private Browsing Forensic Analysis: A Case Study of Privacy Preservation in the Brave Browser." International Journal of Intelligent Engineering and Systems 13, no. 6 (December 31, 2020): 294–306. http://dx.doi.org/10.22266/ijies2020.1231.26.

Full text
Abstract:
The Internet and its users are in continual growth. With it grows the number of organized crimes on the Internet and the potential for individuals to carry out illegal activities. These criminals have gained more awareness of private browsing facilities, and many have found a haven in privacy designed browsers that cover up their tracks and shield their nefarious actions. The development of these privacy features has proven to be a challenge for digital forensic investigators. They strive to perform a thorough analysis of web browsers to collect artefacts relating to illegal activity to be presented as evidence to the court of law and used to convict criminals. “Brave” browser is one of the most recent and fastest-growing private browsers that, up to this point, has not been studied in-depth, and its privacy preservation functionality remains unclear. In this paper, we studied Brave’s private browsing mode, examined its privacy-preserving and forensic data acquisition, and outlined the location and type of evidence available through live and post-mortem state analysis. The unique approach taken included a set of experiments that unveiled how the browser functions and showed the appropriate tools that could be utilized to extract leftover artefacts. Analysis of our results showed that despite Brave leaving no traces of browsing activity on the Hard Disk, visited URLs, images, keyword searches, and even cached videos were retrievable from the RAM, which shows that Brave is not entirely private.
APA, Harvard, Vancouver, ISO, and other styles
33

Van Horn, Royal. "The Perfect Computer and Web Browser Updates." Phi Delta Kappan 88, no. 1 (September 2006): 7–87. http://dx.doi.org/10.1177/003172170608800104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rahmatulloh, Alam, Andi Nur Rachman, and Fahmi Anwar. "Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (May 9, 2019): 327. http://dx.doi.org/10.25126/jtiik.201963936.

Full text
Abstract:
<p class="Abstrak">Teknologi terus menerus berkembang, berbagai jenis teknologi terus bermunculan seperti sistem informasi manajemen arsip, masalahnya para pekerja kadang melakukan pekerjaan lain di komputer sehingga arsip tidak terkontrol. Penerapan <em>Web Push Notification</em> dapat menampilkan pemberitahuan berbasis <em>website</em> meskipun tidak membuka <em>web browser</em> secara langsung atau dalam kondisi <em>minimize</em>. <em>Web Push Notification</em> merupakan mekanisme pemberitahuan menggunakan <em>Javascript</em> pada <em>web browser</em>. Fitur ini tersedia dalam <em>Push API HTML5</em> dengan menggunakan <em>Push Service</em> atau <em>Messaging server</em> yang mengirim pemberitahuan ke <em>web browser</em> yang telah berlangganan tanpa membuka <em>website</em> sehingga dapat melakukan <em>broadcast message</em> dan <em>Notification API HTML5</em> tidak memerlukan <em>Push Service</em> atau <em>Messaging server</em> tetapi harus membuka <em>website</em>, tetapi belum didukung semua <em>web browser</em> sehingga pada makalah ini dibahas Implementasi <em>Web Push Notification</em> pada sistem informasi manajemen arsip menggunakan <em>PushJS</em>, metode pengembangan yang digunakan adalah <em>Rational Unified Proccess (RUP)</em>. Teknologi pemberitahuan yang cocok untuk sistem informasi manajemen arsip berbasis <em>web</em> yaitu <em>Notification API HTML5</em> karena tidak akan mengirim pemberitahuan yang sama ke semua pengguna. Namun tidak ada proses di belakang layar sehingga tidak akan dijalankan secara otomatis, masalah tersebut diatasi dengan menggunakan <em>AJAX</em> dengan mengambil <em>JSON</em> kemudian dijalankan berulang-ulang pada <em>web browser</em> dan meminimalisir bentrokan antara <em>script web push notification</em> di <em>multi tab window</em> atau <em>window web browser</em> diatasi menggunakan <em>localStorage</em> dari <em>WebStorage API HTML5</em>. Hasil uji menunjukan bahwa penerapan teknologi <em>Web Push Notification</em> pada Sistem Informasi Manajemen Arsip dapat membantu para pengguna dalam mengelola arsip yang banyak serta penggunaan <em>AJAX</em> berpengaruh terhadap kecepatan akses web.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Judul2"><em>Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. Web Push Notification is a notification mechanism using Javascript in a web browser. This feature is available in the HTML5 Push API by using a Push Service or Messaging server that sends notifications to subscribed web browsers without opening the website so that it can broadcast and the HTML5 Notification API does not require a Push Service or Messaging server but must open a website, but not supported all web browsers so that this paper discusses Push Notification Web Implementation in archive management information systems using PushJS, the development method used is the Rational Unified Process (RUP). Notification technology that is suitable for web-based archive management information systems namely HTML5 Notification API because it will not send the same notification to all users. But there is no process behind the scenes so that it will not be run automatically, the problem is overcome by using AJAX by retrieving JSON and then running repeatedly on the web browser and minimizing clashes between web push notification scripts on multi tab windows or web browser windows resolved using localStorage from the HTML5 WebStorage API. The test results show that the application of Web Push Notification technology in the Archive Management Information System can help users manage many archives and use AJAX influences the speed of web access.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
35

Kenguka, Kenguka Mohamed, and Atindimile Suleiman . "Flash Support on Embedded Web Browsers." Information Technology Journal 5, no. 6 (October 15, 2006): 1058–62. http://dx.doi.org/10.3923/itj.2006.1058.1062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Roberts, Charles, Graham Wakefield, Matthew Wright, and JoAnn Kuchera-Morin. "Designing Musical Instruments for the Browser." Computer Music Journal 39, no. 1 (March 2015): 27–40. http://dx.doi.org/10.1162/comj_a_00283.

Full text
Abstract:
Native Web technologies provide great potential for musical expression. We introduce two JavaScript libraries towards this end: Gibberish.js, providing heavily optimized audio DSP, and Interface.js, a GUI toolkit that works with mouse, touch, and motion events. Together they provide a complete system for defining musical instruments that can be used in both desktop and mobile Web browsers. Interface.js also enables control of remote synthesis applications via a server application that translates the socket protocol used by Web interfaces into both MIDI and OSC messages. We have incorporated these libraries into the creative coding environment Gibber, where we provide mapping abstractions that enable users to create digital musical instruments in as little as a single line of code. They can then be published to a central database, enabling new instruments to be created, distributed, and run entirely in the browser.
APA, Harvard, Vancouver, ISO, and other styles
37

Min, Qiusha, Zhifeng Wang, and Neng Liu. "An Evaluation of HTML5 and WebGL for Medical Imaging Applications." Journal of Healthcare Engineering 2018 (August 29, 2018): 1–11. http://dx.doi.org/10.1155/2018/1592821.

Full text
Abstract:
Despite the fact that a large number of web applications are used in the medical community, there are still certain technological challenges that need to be addressed, for example, browser plug-ins and efficient 3D visualization. These problems make it necessary for a specific browser plug-in to be preinstalled on the client side when launching applications. Otherwise, the applications fail to run due to the lack of the required software. This paper presents the latest techniques in hypertext markup language 5 (HTML5) and web graphics library (WebGL) for solving these problems and an evaluation of the suitability of the combination of HTML5 and WebGL for the development of web-based medical imaging applications. In this study, a comprehensive medical imaging application was developed using HTML5 and WebGL. This application connects to the medical image server, runs on a standard personal computer (PC), and is easily accessible via a standard web browser. The several functions required for radiological interpretation were implemented, for example, navigation, magnification, windowing, and fly-through. The HTML5-based medical imaging application was tested on major browsers and different operating systems over a local area network (LAN) and a wide area network (WAN). The experimental results revealed that this application successfully performed two-dimensional (2D) and three-dimensional (3D) functions on different PCs over the LAN and WAN. Moreover, it demonstrated an excellent performance for remote access users, especially over a short time period for 3D visualization and a real-time fly-through navigation. The results of the study demonstrate that HTML5 and WebGL combination is suitable for the development of medical imaging applications. Moreover, the advantages and limitations of these technologies are discussed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
38

Bielecki, Michał, Jan Hidders, Jan Paredaens, Marc Spielmann, Jerzy Tyszkiewicz, and Jan Van den Bussche. "The Navigational Power of Web Browsers." Theory of Computing Systems 50, no. 2 (October 5, 2010): 213–40. http://dx.doi.org/10.1007/s00224-010-9294-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Saptono, Arief, Abdul Malik, and Muhamad Satim. "Rancang Bangun Sistem Kontrol Keamanan Gerbang Menggunakan Raspberry Pi B+ Berbasis Web." Journal CERITA 7, no. 1 (February 24, 2021): 10–18. http://dx.doi.org/10.33050/cerita.v7i1.1475.

Full text
Abstract:
Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.
APA, Harvard, Vancouver, ISO, and other styles
40

Dong, Zhijia, Gaoming Jiang, Guoming Huang, and Honglian Cong. "A web-based 3D virtual display framework for warp-knitted seamless garment design." International Journal of Clothing Science and Technology 30, no. 3 (June 4, 2018): 332–46. http://dx.doi.org/10.1108/ijcst-05-2017-0060.

Full text
Abstract:
Purpose The virtual display of 3D garment is one of the most important features in a computer-aided garment design system. The purpose of this paper is to present a novel web-based 3D virtual display framework for the online design of warp-knitted seamless garment using the latest WebGL and HTML5 technologies. Design/methodology/approach Based on the feature-based parametric 3D human body model, the 3D model of skin-tight warp-knitted seamless garment is established using the geometric modeling method. By applying plane parameterization technology, the 3D garment model is then projected into corresponding 2D prototype pattern and a texture-mapping relationship is obtained. Finally, an online 3D virtual display application framework for warp-knitted seamless garment is implemented on modern WebGL-enabled web browsers using the latest WebGL and HTML5 technologies, which allow garment designers to globally access without installing any additional software or plugin. Findings Based on the 2D/3D model of warp-knitted seamless garment, an online 3D virtual display application running on modern WebGL-enabled web browser is implemented using the latest Javascript, WebGL and HTML5 technologies, which is proven to be an effective way for building the web-based 3D garment CAD systems. Originality/value This paper provides a parametric design method for warp-knitted seamless garment 2D/3D model, and web-based online virtual display of 3D warp-knitted seamless garment is implemented for the first time, which establishes the foundation for the web-based online computer-aided warp-knitted seamless garment design system.
APA, Harvard, Vancouver, ISO, and other styles
41

Potter, Bruce. "Alternative web browsers: friend or foe?" Network Security 2007, no. 7 (July 2007): 7–8. http://dx.doi.org/10.1016/s1353-4858(07)70063-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Elvins, T. Todd, David R. Nadeau, Rina Schul, and David Kirsh. "Worldlets: 3-D Thumbnails for Wayfinding in Large Virtual Worlds." Presence: Teleoperators and Virtual Environments 10, no. 6 (December 2001): 565–82. http://dx.doi.org/10.1162/105474601753272835.

Full text
Abstract:
Finding one's way to sites of interest on the Web can be problematic, and this difficulty has been recently exacerbated by widespread development of 3-D Web content and virtual-world browser technology using the Virtual Reality Modeling Language (VRML). Whereas travelers can often navigate 2-D Web sites based on textual and 2-D thumbnail image representations of the sites' content, finding one's way to destinations in 3-D environments is notoriously troublesome. Wayfinding literature provides clear support for the importance of landmarks in building a cognitive map and then using that map to navigate in a 3-D environment, be it real or virtual. Textual and 2-D image landmark representations, however, lack the depth and context needed for travelers to reliably recognize 3-D landmarks. This paper describes a novel 3-D thumbnail landmark affordance called a worldlet. Containing a 3-D fragment of a virtual world, worldlets offer travelers first-person, multi-viewpoint experience with faithful representations of potential destinations. To facilitate an investigation into the comparative advantages of landmark affordances for wayfinding, worldlet capture algorithms were designed, implemented, and incorporated into two VRML-based virtual environment browsers. Findings from a psychological experiment using one of these browsers revealed that, compared to textual and image guidebook usage, worldlet guidebook usage: nearly doubled the time subjects spent studying the landmarks in the guidebook, significantly reduced the time required for subjects to reach landmarks, and reduced backtracking to almost zero. These results support the hypothesis that worldlets facilitate traveler landmark knowledge, expedite wayfinding in large virtual environments, and enable skilled wayfinding.
APA, Harvard, Vancouver, ISO, and other styles
43

Gabet, Ryan M., Kathryn C. Seigfried Spellar, and Marcus K. Rogers. "A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers." International Journal of Electronic Security and Digital Forensics 10, no. 4 (2018): 356. http://dx.doi.org/10.1504/ijesdf.2018.095126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rogers, Marcus K., Kathryn C. Seigfried Spellar, and Ryan M. Gabet. "A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers." International Journal of Electronic Security and Digital Forensics 10, no. 4 (2018): 356. http://dx.doi.org/10.1504/ijesdf.2018.10015330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wadkar, Harshad Suryakant, Arun Mishra, and Arati M. Dixit. "Framework to Secure Browser Using Configuration Analysis." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 49–63. http://dx.doi.org/10.4018/ijisp.2017040105.

Full text
Abstract:
In last few decades, web browser has become one of the most used computer applications. The web browser is available on many devices such as desktops, laptops, palm devices and even in cars. According to recent research reports, the browser is targeted most by exploits in attacks on both home and corporate users. The default browser security configuration may leak user's sensitive information. It may also give remote code execution facility to attacker. In this paper, a framework to detect web browser security misconfiguration is proposed. The misconfiguration leads to data sharing to third party and insecure data transfer. The system scans browser configuration and determine deviation of configuration from secure settings. In addition, the system provides facility to achieve the level of security configuration with respect to recommended settings.
APA, Harvard, Vancouver, ISO, and other styles
46

Song, Bo, and Shengbo Chen. "Testing Web Applications with Web Frameset and Browser Interactions." Information Technology Journal 10, no. 7 (June 15, 2011): 1305–14. http://dx.doi.org/10.3923/itj.2011.1305.1314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kalyanpur, Aditya, Bijan Parsia, Evren Sirin, Bernardo Cuenca Grau, and James Hendler. "Swoop: A Web Ontology Editing Browser." Journal of Web Semantics 4, no. 2 (June 2006): 144–53. http://dx.doi.org/10.1016/j.websem.2005.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Park, W., and S. H. Han. "Intuitive Multi-Touch Gestures for Mobile Web Browsers." Interacting with Computers 25, no. 5 (February 6, 2013): 335–50. http://dx.doi.org/10.1093/iwc/iws026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Du, Weidan, Zhenyu Cheryl Qian, Paul Parsons, and Yingjie Victor Chen. "Personal Web Library: organizing and visualizing Web browsing history." International Journal of Web Information Systems 14, no. 2 (June 18, 2018): 212–32. http://dx.doi.org/10.1108/ijwis-09-2017-0065.

Full text
Abstract:
Purpose Modern Web browsers all provide a history function that allows users to see a list of URLs they have visited in chronological order. The history log contains rich information but is seldom used because of the tedious nature of scrolling through long lists. This paper aims to propose a new way to improve users’ Web browsing experience by analyzing, clustering and visualizing their browsing history. Design/methodology/approach The authors developed a system called Personal Web Library to help users develop awareness of and understand their Web browsing patterns, identify their topics of interest and retrieve previously visited Web pages more easily. Findings User testing showed that this system is usable and attractive. It found that users can easily see patterns and trends at different time granularities, recall pages from the past and understand the local context of a browsing session. Its flexibility provides users with much more information than the traditional history function in modern Web browsers. Participants in the study gained an improved awareness of their Web browsing patterns. Participants mentioned that they were willing to improve their time management after viewing their browsing patterns. Practical implications As more and more daily activities rely on the internet and Web browsers, browsing data captures a large part of users’ lives. Providing users with interactive visualizations of their browsing history can facilitate personal information management, time management and other meta-level activities. Originality/value This paper aims to help users gain insights into and improve their Web browsing experience, the authors hope that the work they conducted can spur more research contributions in this underdeveloped yet important area.
APA, Harvard, Vancouver, ISO, and other styles
50

Toresa, Dafwen. "Perbandingan proxy pada linux dan windows untuk mempercepat browsing website." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 8, no. 1 (March 11, 2017): 50–57. http://dx.doi.org/10.31849/digitalzone.v8i1.628.

Full text
Abstract:
Abstrak- Pada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan, maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa. Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client). Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute. Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute Abstract- At this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy server on different operating system that is Linux Operating System with Squid tools and Windows Operating System with Winroute tool. This study was conducted to determine the comparison of browsing speed of the user's computer (client). The browser used on the user's computer is Mozilla Firefox. This study uses two client computers with each test 5 times accessing web browsing / destination testing via proxy server. From the results of tests conducted, it can be concluded that the application of proxy server in linux operating system with squid tools faster browsing from client using the same web browser and client computer different from the proxy server windows operating system with winroute tools. Keywords: Proxy Server, Linux, Windows, Squid, Winroute
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography