Journal articles on the topic 'Web browser'

To see the other types of publications on this topic, follow the link: Web browser.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Web browser.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Riggs, Colby. "New Web Browser Applications." Library Hi Tech News 21, no. 4 (April 1, 2004): 11–12. http://dx.doi.org/10.1108/07419050410545870.

Full text
Abstract:
Summarises new and developing Web browser technologies. Describes three browsers, one with a “tabbed browsing” capability, another which includes a new productivity tool called a “search information manager”, and a voice operated browser which is still in development.
APA, Harvard, Vancouver, ISO, and other styles
2

Kohana, Masaki, Shinji Sakamoto, and Shusuke Okamoto. "Web Browser Network Based on a BA Model for a Web-Based Virtual World." Future Internet 11, no. 7 (July 5, 2019): 147. http://dx.doi.org/10.3390/fi11070147.

Full text
Abstract:
Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource utilization for web browsers. We improve upon the method in our previous study, which constructed a network for a web-based virtual world, using only location information. When a new user logged into a world, the web browser connected to two other browsers whose users had a location close to that of the user. The experimental results of that method showed 50% data coverage, which was insufficient to display the game screen because the web browser displays the characters on the virtual world. In this study, we attempt to use the BA model to construct more efficient networks than those in the previous study to increase data coverage. Our new method uses the number of connections of the web browser and location information to calculate the probability of web browser selection. The experimental results show that the data coverage exceeds 90%, indicating significant improvement over the previous method.
APA, Harvard, Vancouver, ISO, and other styles
3

Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (February 15, 2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.

Full text
Abstract:
Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Bo, and Gavriel Salvendy. "Design and Validation of a User-Centered Web Browser." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, no. 3 (October 1998): 369–71. http://dx.doi.org/10.1177/154193129804200340.

Full text
Abstract:
New user-centered features were proposed based on the analysis of human limitation in using web browsers. A conventional browser and an enhanced browser were built by using JavaScript and Common Gateway Interface (CGI) programming to rewrite the interface of Netscape Navigator. An experiment was conducted with 64 subjects to test four hypotheses concerning the relationship between search strategies and task types and the usability of the enhanced browser. Different search strategies are found between two tasks. Once the subjects became skilled at using the enhanced browser their performance was superior to using the conventional browser. In the enhanced browser, the subjects were more satisfied in using the reference window and the shopping list and less satisfied in using the pull back and the preview information than using the conventional browser.
APA, Harvard, Vancouver, ISO, and other styles
5

Sangani, K. "Web everywhere [Web browser]." Engineering & Technology 5, no. 16 (October 23, 2010): 26–29. http://dx.doi.org/10.1049/et.2010.1604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Andriamilanto, Nampoina, Tristan Allard, Gaëtan Le Guelvouit, and Alexandre Garel. "A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication." ACM Transactions on the Web 16, no. 1 (February 28, 2022): 1–62. http://dx.doi.org/10.1145/3478026.

Full text
Abstract:
Modern browsers give access to several attributes that can be collected to form a browser fingerprint. Although browser fingerprints have primarily been studied as a web tracking tool, they can contribute to improve the current state of web security by augmenting web authentication mechanisms. In this article, we investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. These properties include their distinctiveness, their stability through time, their collection time, their size, and the accuracy of a simple verification mechanism. We assess these properties on a large-scale dataset of 4,145,408 fingerprints composed of 216 attributes and collected from 1,989,365 browsers. We show that, by time-partitioning our dataset, more than 81.3% of our fingerprints are shared by a single browser. Although browser fingerprints are known to evolve, an average of 91% of the attributes of our fingerprints stay identical between two observations, even when separated by nearly six months. About their performance, we show that our fingerprints weigh a dozen of kilobytes and take a few seconds to collect. Finally, by processing a simple verification mechanism, we show that it achieves an equal error rate of 0.61%. We enrich our results with the analysis of the correlation between the attributes and their contribution to the evaluated properties. We conclude that our browser fingerprints carry the promise to strengthen web authentication mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Shailendra, Prashant Bhardwaj, and Mohammed Abdul Qadeer. "Neo Browser: Java Based Web Browser for Mobile Phones." International Journal of Engineering and Technology 4, no. 6 (2012): 817–20. http://dx.doi.org/10.7763/ijet.2012.v4.491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhadarage, Shubham. "Browser Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 27, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.

Full text
Abstract:
Web browsers play a crucial role in accessing and interacting with information on the internet. However, they also present significant security challenges due to their complexity and the diverse range of threats they face. This paper provides an overview of web browser security, focusing on the key challenges, vulnerabilities, and defences. It discusses common attack vectors, such as cross-site scripting (XSS) and cross-site request forgery (CSRF), as well as browser security features like sandboxing, secure storage, and Content Security Policy (CSP). Additionally, the paper explores emerging threats and future directions in web browser security, highlighting the importance of ongoing research and collaboration among browser vendors, developers, and security experts to ensure a more secure browsing experience for users.
APA, Harvard, Vancouver, ISO, and other styles
9

Queiroz, Jordan S., and Eduardo L. Feitosa. "A Web Browser Fingerprinting Method Based on the Web Audio API." Computer Journal 62, no. 8 (January 22, 2019): 1106–20. http://dx.doi.org/10.1093/comjnl/bxy146.

Full text
Abstract:
Abstract Web Browser Fingerprinting is a process in which the users are, with high likelihood, uniquely identified by the extracted features from their devices, generating an identifier key (fingerprint). Although it can be used for malicious purposes, especially regarding privacy invasion, Web Browser Fingerprinting can also be used to enhance security (e.g. as a factor in two-factor authentication). This paper investigates the use of Web Audio API as a Web Browser Fingerprinting method capable of identifying the devices. The idea is to prove or not if audio can provide features capable to identify users and devices. Our initial results show that the proposed method is capable of identifying the device’s class, based on features like device’s type, web browser’s version and rendering engine.
APA, Harvard, Vancouver, ISO, and other styles
10

Zadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda, and Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.

Full text
Abstract:
The distribution of the vast majority of web browsers is actively encouraged by their free use. This is a common practice of web browser developers, as it provides them with great opportunities for their distribution. The flip side of this process is the collection of personal data by web browser developers that the user does not control. The collected data is automatically transferred to leading IT companies such as Google, Microsoft, and Cloudflare, which collect, accumulate, process, and monetize the users’ data in an automated manner. This leads to the fact that any web browser user is profiled in the services of leading IT companies, which receive complete information about the user's actions on the Internet. This state of affairs contradicts Article 32 of the Constitution of Ukraine, which guarantees the right to privacy and the basic provisions of the Law of Ukraine "On Personal Data Protection". The study involved long-term recording and subsequent analysis of the network traffic of Ukraine's most popular web browsers: Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera. The peculiarity of the study was to obtain network traffic initiated by web browsers that have been active for a long time. To increase the reliability, the data on network connections of web browsers were obtained using two independent software tools for monitoring traffic on the network interface of a communication device. The analysis of network connections of web browsers made it possible to establish close ties between companies developing free web browsers and leading IT companies that monopolistically control the actions of users in the Internet space. This state of affairs contradicts the legal norms on ensuring the privacy of web browser users in the context of using their data without their knowledge and consent. This can be prevented using network screens operating at Layers 3, 4, and 7 of the TCP/IP stack OSI model.
APA, Harvard, Vancouver, ISO, and other styles
11

SahinurHossen, Mohammad, Rakibul Islam, Md Nasef Ur Rahman Chowdhury, Ahshanul Haque, and Qudrat E. Alahy Ratul. "Malware Detection in Web Browser Plugins Using API Calls with Permissions." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5672–77. http://dx.doi.org/10.35444/ijana.2023.14603.

Full text
Abstract:
With the exponential growth of internet users, web browsers play an essential role in gathering knowledge, social networking etc. Browser plugin/add-on is a unique feature of modern browsers that allows for adding new gimmicks to the browser functionality. Although this tool is handy, it poses a significant risk as it can collect and store users browsing history, passwords and more. Hence, attackers can try injecting malicious browser add-ons that can utilize security loopholes wherein the attacker may access user-critical data on the host device. The Smart Extension Malware Detector (SEMD), a reliable browser malware detection system that relies on extension development API calls and privileges using outfit machine learning approaches, was suggested and created by us. The research outcomes demonstrate that the SEMD model outperformed peer models while lowering the difficulty of the detection procedure.
APA, Harvard, Vancouver, ISO, and other styles
12

정동훈 and Choi, Junho. "Mobile Web Browser Testing - Full Browser vs. WAP Browser -." Journal of Digital Design 10, no. 1 (January 2010): 287–95. http://dx.doi.org/10.17280/jdd.2010.10.1.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Şah, Melike, and Wendy Hall. "Dynamic Linking and Personalization on the Web using Linked Open Data." International Journal on Semantic Web and Information Systems 9, no. 2 (April 2013): 31–61. http://dx.doi.org/10.4018/jswis.2013040102.

Full text
Abstract:
This paper presents a novel Semantic Web browser, called SemWeB. SemWeB supports Web browsing using Linked Open Data and personalization. This is the first time a Semantic Web browser combines the advances in Adaptive Hypermedia (i.e. personalization) and Linked Open Data. In particular, users are provided with a personalized and semantically rich Web browsing experience. For example, SemWeB supplies goal-based adaptive information retrieval from the LOD, adaptive link recommendation using a novel semantic relatedness measure and adaptive content creation. A user based study was used to assess the value of LOD-based hyperlinks and personally relevant content compared with a standard Web browser (Firefox). Results showed that users were able to browse and view more relevant information, as well as, value significance of LOD-based hyperlinks and personalized content in comparison to a standard Web browser.
APA, Harvard, Vancouver, ISO, and other styles
14

Baran, Erkan, Huseyin Çakır, and Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi." International Journal of Human Sciences 12, no. 2 (September 16, 2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.

Full text
Abstract:
<p>Nowadays, web browser tools are seen ıntensıvely durıng the usage of web applıcatıons. Because of that, browsers provıdes ınfrastructure of a largo majorıty of crımes. Because guılty or suspect can use the browsers to collect ınformatıons, to hıde hıs crıme, learn new crımınal methods or to apply they have learned. In thıs study, ıt ıs also seeked answers of how a process can be monıtored on the computers whıch are used on browsers, ın whıch fıles whıch datas are looked and when and whıch sıtes are accessed. Accordıng to research of W3counter web stats tool, Chrome Web browser, whıch has %43 persentage of across the world ın usage, ıs proses as the most demanded browser ın thıs study by users, and ıt ıs scented out ın thıs browser's related fıles. In these days, ''hıdden mode'' whıch take part ın vast majorıty of browsers ıs also examıned. Thıs feature of the browser, whıch ıs receıved reference, ıs tracked by testıng and ıs sought data ın RAM memory and fıle systems. Thus, '' hıdden mode'' effects are dıscussed ın provıdıng studıes about suspect or crımınal posıtıon people, what kınd of data can be obtaıned ın usıng '' hıdden mode” ıs revealed.</p><p> </p><p><strong>Özet</strong></p><p>Günümüzde internet uygulamalarının kullanımı sırasında web tarayıcı araçlarının yoğun bir şekilde kullanımı görülmektedir. Bu nedenle tarayıcılar, işlenen suçların büyük bir çoğunluğuna altyapı sağlar. Çünkü suçlu ya da şüpheli, tarayıcıları bilgi toplamak, suçunu gizlemek, yeni suç metotları öğrenmek ya da öğrendiklerini uygulamak için kullanabilir. Bu çalışmada da tarayıcıların kullanıldığı bilgisayarlar üzerinde bırakılan izlerin tespitinde nasıl bir süreç izlenebileceği, hangi dosyalarda hangi verilere bakılabileceği ve ne zaman hangi sitelere erişim sağlandığı gibi çeşitli sorulara cevaplar aranmaktadır. w3counter adlı internet istatistik aracının yaptığı araştırmaya göre, dünya genelinde %43'lük bir kullanım alanına sahip olan Chrome web tarayıcısı, kullanıcılar tarafından en çok talep gören tarayıcı olarak bu araştırma içinde referans alınmaktadır ve bu tarayıcıya ait ilgili dosyalarda izler sürülmektedir. Ayrıca günümüz tarayıcıların büyük bir çoğunluğunda yer alan “<strong>gizli mod</strong>” özelliği incelenmektedir. Referans alınan tarayıcının bu özelliği test edilerek iz sürülmekte, dosya sistemlerinde ve RAM bellekte veri aranmaktadır.Böylelikle “gizli mod” kullanımında ne tür veriler elde edilebileceği ortaya konarak şüpheli ya da suçlu konumundaki kişilere ait delillendirme çalışmalarında “gizli mod” kullanımının etkileri tartışılmaktadır. </p>
APA, Harvard, Vancouver, ISO, and other styles
15

Kurako, E. A., R. E. Asratian, and V. L. Orlov. "Service Browser in Linux Environment." Programmnaya Ingeneria 15, no. 5 (May 21, 2024): 219–28. http://dx.doi.org/10.17587/prin.15.219-228.

Full text
Abstract:
The key features of using web browsers and service browsers as clients of information systems are considered. A minimal set of methods has been defined that is sufficient for the effective support of client functioning. A comparison is made of the main methods that a browser used as a universal means of providing client applications should include. The basic steps of the service-browser algorithm are presented. The service browser has the full range of necessary ways to process information from the client. At the same time, it is more lightweight than a web browser. However, well-known service browsers operate in a Windows environment, which limits the scope of use. The possibility of transferring and using a C#-based service browser from a Windows environment to a Linux environment is considered. The base problems with the transfer are described. Migration methods are proposed. Using the example of the service module "System Manager", which is actually identical in both systems, a comparative analysis of the work was carried out. In order to estimate only the operating time of the service-browser components, a unified database management system is used. The launch of the main modules in the Linux environment is somewhat faster, which is explained by the features of GTK widgets. At the same time, in the Windows environment, it is much easier to develop systems with a complex graphical interface due to a richer palette of visual components. Existing web browsers are quite cumbersome and contain many functions that may be unnecessary for the development of information systems. A compact solution that includes all the necessary methods for use in the client is to use a service-browser. This paper proposes a method for building service browsers in the Linux environment based on the C# language and the Mono package, taking into account the developed additional components.
APA, Harvard, Vancouver, ISO, and other styles
16

Sy, Erik, Christian Burkert, Hannes Federrath, and Mathias Fischer. "A QUIC Look at Web Tracking." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.

Full text
Abstract:
Abstract QUIC has been developed by Google to improve the transport performance of HTTPS traffic. It currently accounts for approx. 7% of the global Internet traffic. In this work, we investigate the feasibility of user tracking via QUIC from the perspective of an online service. Our analysis reveals that the protocol design contains violations of privacy best practices through which a tracker can passively and uniquely identify clients across several connections. This tracking mechanisms can achieve reduced delays and bandwidth requirements compared to conventional browser fingerprinting or HTTP cookies. This allows them to be applied in resource- or time-constrained scenarios such as real-time biddings in online advertising. To validate this finding, we investigated browsers which enable QUIC by default, e.g., Google Chrome. Our results suggest that the analyzed browsers do not provide protective measures against tracking via QUIC. However, the introduced mechanisms reset during a browser restart, which clears the cached connection data and thus limits achievable tracking periods. To mitigate the identified privacy issues, we propose changes to QUIC’s protocol design, the operation of QUIC-enabled web servers, and browser implementations.
APA, Harvard, Vancouver, ISO, and other styles
17

Cassel, Darion, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia, and Timothy Libert. "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 227–52. http://dx.doi.org/10.2478/popets-2022-0012.

Full text
Abstract:
Abstract Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mobile browsers. Our study leverages a new web measurement infrastructure, OmniCrawl, which we develop to drive browsers on desktop computers and smartphones located on two continents. We capture web tracking measurements using 42 different non-emulated browsers simultaneously. We find that the third-party advertising and tracking ecosystem of mobile browsers is more similar to that of desktop browsers than previous findings suggested. We study privacy-focused browsers and find their protections differ significantly and in general are less for lower-ranked sites. Our findings also show that common methodological choices made by web measurement studies, such as the use of emulated mobile browsers and Selenium, can lead to website behavior that deviates from what actual users experience.
APA, Harvard, Vancouver, ISO, and other styles
18

Bensch, Michael, Ahmed A. Karim, Jürgen Mellinger, Thilo Hinterberger, Michael Tangermann, Martin Bogdan, Wolfgang Rosenstiel, and Niels Birbaumer. "Nessi: An EEG-Controlled Web Browser for Severely Paralyzed Patients." Computational Intelligence and Neuroscience 2007 (2007): 1–5. http://dx.doi.org/10.1155/2007/71863.

Full text
Abstract:
We have previously demonstrated that an EEG-controlled web browser based on self-regulation of slow cortical potentials (SCPs) enables severely paralyzed patients to browse the internet independently of any voluntary muscle control. However, this system had several shortcomings, among them that patients could only browse within a limited number of web pages and had to select links from an alphabetical list, causing problems if the link names were identical or if they were unknown to the user (as in graphical links). Here we describe a new EEG-controlled web browser, called Nessi, which overcomes these shortcomings. In Nessi, the open source browser, Mozilla, was extended by graphical in-place markers, whereby different brain responses correspond to different frame colors placed around selectable items, enabling the user to select any link on a web page. Besides links, other interactive elements are accessible to the user, such as e-mail and virtual keyboards, opening up a wide range of hypertext-based applications.
APA, Harvard, Vancouver, ISO, and other styles
19

Kakar, Abdul Sattar, and Muhammad Sadiq Rohie. "A Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering Research and Science 5, no. 7 (July 6, 2020): 773–80. http://dx.doi.org/10.24018/ejers.2020.5.7.1976.

Full text
Abstract:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and recommend various techniques for this purpose. This study consequently reviews the recent likelihood probabilistic methods, to figure out how browsers store web objects in their caches, and which methods are used to load more speedily and to store a great number of web objects. The comparison between numerous browsers performed to pick and recommend the utmost one for usage. The result has shown that each browser using RI (Ratio Improvement) has powerful performance; to be discussed later. It has proposed using Google Chrome browser because web objects are placed in its cache through the RI technique that correlated with browsers' effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
20

Kakar, Abdul Sattar, and Muhammad Sadiq Rohie. "Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering and Technology Research 5, no. 7 (July 6, 2020): 773–80. http://dx.doi.org/10.24018/ejeng.2020.5.7.1976.

Full text
Abstract:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and recommend various techniques for this purpose. This study consequently reviews the recent likelihood probabilistic methods, to figure out how browsers store web objects in their caches, and which methods are used to load more speedily and to store a great number of web objects. The comparison between numerous browsers performed to pick and recommend the utmost one for usage. The result has shown that each browser using RI (Ratio Improvement) has powerful performance; to be discussed later. It has proposed using Google Chrome browser because web objects are placed in its cache through the RI technique that correlated with browsers' effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
21

Hasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J, and Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities." Journal of Forensic Science and Research 5, no. 1 (March 8, 2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.

Full text
Abstract:
Forensic analysts are more than ever facing challenges upon conducting their deep investigative analysis on digital devices due to the technological progression. Of these are the difficulties present upon analyzing web browser artefacts as this became more complicated when web browser companies introduced private browsing mode, a feature aiming to protect users’ data upon opening a private browsing session, by leaving no traces of data on the local device used. Aiming to investigate whether the claims of web browser companies are true concerning the protection private browsing provides to the users and whether it really doesn’t leave any browsing data behind, the most popular desktop browsers in Windows were analyzed after surfing them regularly and privately. The results shown in this paper suggest that the privacy provided varies among different companies since evidence might be recovered from some of the browsers but not from others.
APA, Harvard, Vancouver, ISO, and other styles
22

Fajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (December 1, 2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.

Full text
Abstract:
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnerability. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Firefox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time.
APA, Harvard, Vancouver, ISO, and other styles
23

Niakanlahiji, Amirreza, and Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense." Security and Communication Networks 2019 (May 14, 2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.

Full text
Abstract:
Existing mitigation techniques for cross-site scripting attacks have not been widely adopted, primarily due to imposing impractical overheads on developers, Web servers, or Web browsers. They either enforce restrictive coding practices on developers, fail to support legacy Web applications, demand browser code modification, or fail to provide browser backward compatibility. Moving target defense (MTD) is a novel proactive class of techniques that aim to defeat attacks by imposing uncertainty in attack reconnaissance and planning. This uncertainty is achieved by frequent and random mutation (randomization) of system configuration in a manner that is not traceable (predictable) by attackers. In this paper, we present WebMTD, a proactive moving target defense mechanism that thwarts various kinds of cross-site scripting (XSS) attacks on Web applications. Relying on built-in features of modern Web browsers, WebMTD randomizes values of certain attributes of Web elements to differentiate the application code from the injected code and disallow its execution; this is done without requiring Web developer involvement or browser code modification. Through rigorous evaluation, we show that WebMTD has very a low performance overhead. Also, we argue that our technique outperforms all competing approaches due to its broad effectiveness, transparency, backward compatibility, and low overhead.
APA, Harvard, Vancouver, ISO, and other styles
24

El-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (August 31, 2021): 337–44. http://dx.doi.org/10.18280/isi.260401.

Full text
Abstract:
In criminal investigations, the digital evidence extracted from social media may provide exceptional support. Reviewing the history or cache of the web browser may provide a valuable insight into the activity of the suspect. The growing popularity of Internet video streaming creates a risk of this technology misuse. There are a few published research on video reconstruction forensics on the Chrome browser. There is a difference in the methods applied to reconstruct cached video on Chrome from the methods applied to Firefox or any browser. Our primary focus in this research is to examine the forensic procedures required to reconstruct cached video stream data using Twitter and YouTube on the Firefox browser. Some work has been done to reconstruct a cached video on the Chrome browser, but we need more work on the rest of the browsers, most notably the Firefox browser used in this research. Both examination strategies and contemplations displayed are approved and suitable for the forensic study of various streaming platforms as well as the web browser caches.
APA, Harvard, Vancouver, ISO, and other styles
25

Brindha.S, Brindha S. "Developing Web Browser-Jan." IOSR Journal of Computer Engineering 10, no. 2 (2013): 75–78. http://dx.doi.org/10.9790/0661-01027578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gifford, Atticus, Benjamin J. Menasha, and David Finkel. "The visible Web browser." ACM SIGCSE Bulletin 31, no. 3 (September 1999): 209. http://dx.doi.org/10.1145/384267.305959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Abdiati, Agustia Dwi, Santoso Setiawan, and Hendra Supendar. "Pemilihan Web Browser Pada Mobile Menggunakan Metode Analytical Hierachy Process." Jurnal Infortech 3, no. 1 (June 15, 2021): 26–32. http://dx.doi.org/10.31294/infortech.v3i1.10298.

Full text
Abstract:
Kenyamanan dalam berinternet didukung oleh web browser yang digunakan. Web browser adalah perangkat lunak (software) yang digunakan untuk berselancar dalam dunia internet. Berkat kemajuan teknologi, saat ini web browser dapat digunakan pada mobile. Hal tersebut menjadikan para pengembang web bersaing untuk berinovasi menciptakan web browser yang dapat digunakan pada mobile. Dengan banyaknya pilihan yang ada, menjadikan para pengguna web browser bingung. Web browser apa yang terbaik untuk digunakan pada mobile dan sesuai dengan keinginan. Hal ini menjadi latar belakang penelitian, bagaimana menerapkan metode Analytical Hierarchy Process (AHP) untuk memilih web browser pada mobile. Penelitian ini bertujuan membuat sistem pendukung keputusan bagi pengguna internet, dalam menentukan pilihan mobile web browser yang tepat sesuai kriteria.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhou, Chijin, Quan Zhang, Lihua Guo, Mingzhe Wang, Yu Jiang, Qing Liao, Zhiyong Wu, Shanshan Li, and Bin Gu. "Towards Better Semantics Exploration for Browser Fuzzing." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (October 16, 2023): 604–31. http://dx.doi.org/10.1145/3622819.

Full text
Abstract:
Web browsers exhibit rich semantics that enable a plethora of web-based functionalities. However, these intricate semantics present significant challenges for the implementation and testing of browsers. For example, fuzzing, a widely adopted testing technique, typically relies on handwritten context-free grammars (CFGs) for automatically generating inputs. However, these CFGs fall short in adequately modeling the complex semantics of browsers, resulting in generated inputs that cover only a portion of the semantics and are prone to semantic errors. In this paper, we present SaGe, an automated method that enhances browser fuzzing through the use of production-context sensitive grammars (PCSGs) incorporating semantic information. Our approach begins by extracting a rudimentary CFG from W3C standards and iteratively enhancing it to create a PCSG. The resulting PCSG enables our fuzzer to generate inputs that explore a broader range of browser semantics with a higher proportion of semantically-correct inputs. To evaluate the efficacy of SaGe, we conducted 24-hour fuzzing campaigns on mainstream browsers, including Chrome, Safari, and Firefox. Our approach demonstrated better performance compared to existing browser fuzzers, with a 6.03%-277.80% improvement in edge coverage, a 3.56%-161.71% boost in semantic correctness rate, twice the number of bugs discovered. Moreover, we identified 62 bugs across the three browsers, with 40 confirmed and 10 assigned CVEs.
APA, Harvard, Vancouver, ISO, and other styles
29

Oktavianita, Annisa Dwi, Hendra Dea Arifin, Muhammad Dzulfikar Fauzi, and Aulia Faqih Rifa'i. "An Analysis of Memory Usage in Web Browser Software." IJID (International Journal on Informatics for Development) 5, no. 2 (December 26, 2016): 21. http://dx.doi.org/10.14421/ijid.2016.05204.

Full text
Abstract:
A RAM or formerly known as a memory is a primary memory which helps swift data availability without waiting the whole data processed by the hard disk. A memory is also used by all installed applications including web browsers but there have been disappointed in cases of memory usages. Researchers use a descriptive quantitative approach with an observation, a central tendency and a dispersion method. There are 15 browsers chosen by random to be tested with low, medium and high loads to get their memory usage logs. Researchers proceed to analyze the log by using descriptive statistics to measure the central tendency and dispersion of data. A standard reference value from web application memory usage has been found as much as 393.38 MB. From that point, this research is successful and has been found the result. The web browser with the lowest memory usage is Flock with 134.67 MB and the web browser with the highest memory usage is Baidu with 699.66 MB.
APA, Harvard, Vancouver, ISO, and other styles
30

Kletz, Sabrina, Marco Bertini, and Mathias Lux. "Open source column: Deep learning in the browser." ACM SIGMultimedia Records 11, no. 1 (March 2019): 1. http://dx.doi.org/10.1145/3458462.3458466.

Full text
Abstract:
Having already discussed MatConvNet and Keras, let us continue with an open source framework for deep learning, which takes a new and interesting approach. TensorFlow.js is not only providing deep learning for JavaScript developers, but it's also making applications of deep learning available in the WebGL enabled web browsers, or more specifically, Chrome, Chromium-based browsers, Safari and Firefox. Recently node.js support has been added, so TensorFlow.js can be used to directly control TensorFlow without the browser. TensorFlow.js is easy to install. As soon as a browser is installed one is ready to go. Browser based, cross platform applications, e.g. running with Electron, can also make use of TensorFlow.js without an additional install. The performance, however, depends on the browser the client is running, and memory and GPU on the client device. More specifically, one cannot expect to analyze 4K videos on a mobile phone in real time. While it's easy to install, and it's easy to develop based on TensorFlow.js, there are drawbacks: (i) developers have less control over where the machine learning actually takes place (e.g. on CPU or GPU), that it is running in the same sandbox as all web pages in the browser do, and (ii) that in the current release it still has rough edges and is not considered stable enough to use in production.
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Wen Tao. "Research on Offline Storage of Web Page." Applied Mechanics and Materials 518 (February 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.518.305.

Full text
Abstract:
Offline storage technology has many uses in the Web application and it can store the user status, cache data, temporary data, and persistent data and so on. In this paper several typical web client storage technologies are discussed and it includes the IE browser's unique storage technology UserData, localStorage and sessionStorage of HTML5, Web SQL Databases, Indexed Database, as well as classic storage technology Cookie and so on. Their concrete using methods are explained and their individual strengths and differences are compared. Their respective applications occasions and some issues that need attention are discussed. The general cross-browser offline storage method is presented and it can use the same application programming interface to complete different browser offline storage technologies.
APA, Harvard, Vancouver, ISO, and other styles
32

Gannouni, Sofien, Nourah Alangari, Hassan Mathkour, Hatim Aboalsamh, and Kais Belwafi. "BCWB." International Journal on Semantic Web and Information Systems 13, no. 2 (April 2017): 55–73. http://dx.doi.org/10.4018/ijswis.2017040104.

Full text
Abstract:
Web access and web resources open many horizons, their usage increases in all life aspects including government, education, commerce and entertainment, where the key to such resources lies in Web browsers. Acknowledging the importance of universal accessibility to web resources, the W3C has developed a series of guidelines into a Web Accessibility Initiative (WAI), with the goal of providing access to web resources for people with disabilities. In order to bridge the gap in the digital divide between the disabled and the non-disabled people, the authors believe that the development of novel assistive technologies using new human-computer interfaces will go a long way towards achieving this lofty goal. In this paper, they present a P300 Electroencephalography Brain-controlled Web browser to enhance the accessibility of people with severe motor disabilities to Web resources. It enhances their interaction with the Web taking their needs into account. The proposed Web browser satisfies the Mankoff's requirements of a system that would “allow true web access.”
APA, Harvard, Vancouver, ISO, and other styles
33

Paes, Fagner Christian, and Willian Massami Watanabe. "Detecção Automática de Incompatibilidades Cross-Browser utilizando Redes Neurais Artificiais." Journal on Advances in Theoretical and Applied Informatics 2, no. 2 (December 21, 2016): 55. http://dx.doi.org/10.26729/jadi.v2i2.2109.

Full text
Abstract:
Cross-Browser Incompatibilities (XBIs) represent inconsistencies in Web Application when introduced in different browsers. The growing number of implementation of browsers (Internet Explorer, Microsoft Edge, Mozilla Firefox, Google Chrome) and the constant evolution of the specifications of Web technologies provided differences in the way that the browsers behave and render the web pages. The web applications must behave consistently among browsers. Therefore, the web developers should overcome the differences that happen during the rendering in different environments by detecting and avoiding XBIs during the development process. Many web developers depend on manual inspection of web pages in several environments to detect the XBIs, independently of the cost and time that the manual tests represent to the process of development. The tools for the automatic detection of the XBIs accelerate the inspection process in the web pages, but the current tools have little precision, and their evaluations report a large percentage of false positives. This search aims to evaluate the use of Artificial Neural Networks for reducing the numbers of false positives in the automatic detection of the XBIs through the CSS (Cascading Style Sheets) and the relative comparison of the element in the web page.
APA, Harvard, Vancouver, ISO, and other styles
34

Ray, Loye Lynn. "Countering Cross-Site Scripting in Web-based Applications." International Journal of Strategic Information Technology and Applications 6, no. 1 (January 2015): 57–68. http://dx.doi.org/10.4018/ijsita.2015010105.

Full text
Abstract:
Today's dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security project (OWASP) top ten web-threats. XSS occurs when a Web-based application allows untrusted information be accepted and sent back to a browser. Also they can execute scripts within a browser that can deface web sites, redirect users to malicious content and hijack browsers. One reason for this problem was the lack of developers understanding the causes of XSS. In this paper, the authors address the causes of XSS and countermeasures to defense against these threats.
APA, Harvard, Vancouver, ISO, and other styles
35

Zalipynis, Ramon Antonio Rodriges, and Nikita Terlych. "WebArrayDB." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3622–25. http://dx.doi.org/10.14778/3554821.3554859.

Full text
Abstract:
Geospatial array DBMSs operate on georeferenced N -d arrays. They provide storage engines, query parsers, and processing capabilities as their core functionality. Traditionally, those have been too heavy for a Web browser to support. Hence, Web Applications, mostly Geographic Information Systems (GISs), run array management on their server back-ends that return small portions of the results via the network. We showcase WebArrayDB, the first geospatial array DBMS that can run completely inside a Web browser. We demonstrate that modern Web browsers, JavaScript, and respective software libraries are sufficiently mature to build and run such a feature-rich and powerful DBMS. A Web-based array DBMS should reduce server load, enable offline work, decrease network I/O, and improve user experience. We also present ArrayGIS, our new Web GIS based on WebArrayDB, and invite everyone to explore both via a freely accessible, informative, and interactive Web GUI.
APA, Harvard, Vancouver, ISO, and other styles
36

Shoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2023): 1–11. http://dx.doi.org/10.48001/joitml.2023.111-11.

Full text
Abstract:
The Internet of Things is the concept of a data network between devices (things) smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives images from these cameras on the host device, in the method of embedded JavaScript of the Internet of Things, which is the implementation of JavaScript codes from the web page of the Internet browser on specific devices, such as smartphones. This article provides examples of the implementation of JavaScript codes from the developed web page of the Internet browser, used by the author, which allow implementing the developed web applications on smartphones.
APA, Harvard, Vancouver, ISO, and other styles
37

Shoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (February 10, 2024): 1–8. http://dx.doi.org/10.48001/joitml.2024.111-8.

Full text
Abstract:
The Internet of Things is the concept of a data network between devices ("things"): smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives images from these cameras on the host device, in the method of embedded JavaScript of the Internet of Things, which is the implementation of JavaScript codes from the web page of the Internet browser on specific devices, such as smartphones. This article provides examples of the implementation of JavaScript codes from the developed web page of the Internet browser, used by the author, which allow implementing the developed web applications on smartphones.
APA, Harvard, Vancouver, ISO, and other styles
38

Shukla, Abhishek. "Comparative Analysis of Webkit and Non-Webkit Based Browsers and their Future." Journal of Mathematical & Computer Applications 2, no. 4 (December 31, 2023): 1–3. http://dx.doi.org/10.47363/jmca/2023(2)130.

Full text
Abstract:
Web browsers have become an integral part of our daily lives, facilitating access to the vast world of information on the internet. While several web browsers are available, they can be broadly categorized into two groups: WebKit-based and non-WebKit-based browsers. This article provides a comprehensive comparative analysis of these two browser categories, discussing their origins, development, key features, and market share, as well as what the future looks like for both of these categories.
APA, Harvard, Vancouver, ISO, and other styles
39

Jung, Won-Chi, and Namje Park. "A Safe Web in Network Separation Environment." Journal of Computational and Theoretical Nanoscience 17, no. 7 (July 1, 2020): 3243–49. http://dx.doi.org/10.1166/jctn.2020.9168.

Full text
Abstract:
This paper describes a technique for constructing network separation and proposes a method for providing convenience to users by using it. This paper analyzes the background of the Korean government’s adoption of the network separation policy. And there are various techniques for configuring network separation. NAC, media control solution and file transfer system are essential for network separation. Because just running two networks does not guarantee secure. This paper considers ways to provide efficiency and convenience to the extent allowed by the network separation policy. In this paper, Using Headless Browser, transform web pages into electronic documents. The converted electronic document does not contain malicious code. Several Headless browser packages were used to implement and test assuming a virtual network separation. Web scraping technology worked reliably, almost all browsers can read and display PDF file. In this paper, we have defined a safe web prototype in a network separation environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhou, Jian-Zhong (Joe). "The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers." Information Technology and Libraries 19, no. 1 (September 17, 2017): 50–52. http://dx.doi.org/10.6017/ital.v19i1.10075.

Full text
Abstract:
This article first examines the difference between two very familiar and sometimes synonymous terms, the Internet and the Web. The article then explains the relationship between the Web's protocol HTTP and other high-level Internet protocols, such as Telnet and FTP, as well as provides a brief history of Web development. Next, the article analyzes the mechanism in which a Web browser (client) "talks" to a Web server on the Internet. Finally, the article studies the market growth for Web browsers and Web servers between 1993 and 1999. Two statistical sources were used in the Web market analysis: a survey conducted by the University of Delaware Libraries for the 122 members of the Association of Research Libraries, and the data for the entire Web industry from different Web survey agencies.
APA, Harvard, Vancouver, ISO, and other styles
41

Leith, Douglas J. "Web Browser Privacy: What Do Browsers Say When They Phone Home?" IEEE Access 9 (2021): 41615–27. http://dx.doi.org/10.1109/access.2021.3065243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rahmatulloh, Alam, Andi Nur Rachman, and Fahmi Anwar. "Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (May 9, 2019): 327. http://dx.doi.org/10.25126/jtiik.201963936.

Full text
Abstract:
<p class="Abstrak">Teknologi terus menerus berkembang, berbagai jenis teknologi terus bermunculan seperti sistem informasi manajemen arsip, masalahnya para pekerja kadang melakukan pekerjaan lain di komputer sehingga arsip tidak terkontrol. Penerapan <em>Web Push Notification</em> dapat menampilkan pemberitahuan berbasis <em>website</em> meskipun tidak membuka <em>web browser</em> secara langsung atau dalam kondisi <em>minimize</em>. <em>Web Push Notification</em> merupakan mekanisme pemberitahuan menggunakan <em>Javascript</em> pada <em>web browser</em>. Fitur ini tersedia dalam <em>Push API HTML5</em> dengan menggunakan <em>Push Service</em> atau <em>Messaging server</em> yang mengirim pemberitahuan ke <em>web browser</em> yang telah berlangganan tanpa membuka <em>website</em> sehingga dapat melakukan <em>broadcast message</em> dan <em>Notification API HTML5</em> tidak memerlukan <em>Push Service</em> atau <em>Messaging server</em> tetapi harus membuka <em>website</em>, tetapi belum didukung semua <em>web browser</em> sehingga pada makalah ini dibahas Implementasi <em>Web Push Notification</em> pada sistem informasi manajemen arsip menggunakan <em>PushJS</em>, metode pengembangan yang digunakan adalah <em>Rational Unified Proccess (RUP)</em>. Teknologi pemberitahuan yang cocok untuk sistem informasi manajemen arsip berbasis <em>web</em> yaitu <em>Notification API HTML5</em> karena tidak akan mengirim pemberitahuan yang sama ke semua pengguna. Namun tidak ada proses di belakang layar sehingga tidak akan dijalankan secara otomatis, masalah tersebut diatasi dengan menggunakan <em>AJAX</em> dengan mengambil <em>JSON</em> kemudian dijalankan berulang-ulang pada <em>web browser</em> dan meminimalisir bentrokan antara <em>script web push notification</em> di <em>multi tab window</em> atau <em>window web browser</em> diatasi menggunakan <em>localStorage</em> dari <em>WebStorage API HTML5</em>. Hasil uji menunjukan bahwa penerapan teknologi <em>Web Push Notification</em> pada Sistem Informasi Manajemen Arsip dapat membantu para pengguna dalam mengelola arsip yang banyak serta penggunaan <em>AJAX</em> berpengaruh terhadap kecepatan akses web.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Judul2"><em>Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. Web Push Notification is a notification mechanism using Javascript in a web browser. This feature is available in the HTML5 Push API by using a Push Service or Messaging server that sends notifications to subscribed web browsers without opening the website so that it can broadcast and the HTML5 Notification API does not require a Push Service or Messaging server but must open a website, but not supported all web browsers so that this paper discusses Push Notification Web Implementation in archive management information systems using PushJS, the development method used is the Rational Unified Process (RUP). Notification technology that is suitable for web-based archive management information systems namely HTML5 Notification API because it will not send the same notification to all users. But there is no process behind the scenes so that it will not be run automatically, the problem is overcome by using AJAX by retrieving JSON and then running repeatedly on the web browser and minimizing clashes between web push notification scripts on multi tab windows or web browser windows resolved using localStorage from the HTML5 WebStorage API. The test results show that the application of Web Push Notification technology in the Archive Management Information System can help users manage many archives and use AJAX influences the speed of web access.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
43

Vatsal, Prince. "Real-Time Human Pose Estimation Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (May 21, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem34377.

Full text
Abstract:
Human pose estimation is a pivotal domain within computer vision, underpinning applications from motion capture in cinematic production to sophisticated user interfaces in desktop devices. This research delineates the implementation of real-time human pose estimation within web browsers utilizing TensorFlow.js and the PoseNet model. PoseNet, an advanced machine learning model optimized for browser-based execution, facilitates precise pose detection sans specialized hardware. The primary aim of this study is to integrate PoseNet with TensorFlow.js, achieving efficient real-time pose estimation directly in the browser by leveraging JavaScript, thereby ensuring seamless user interaction and broad accessibility. A modular system architecture is designed, focusing on optimization strategies such as model quantization, asynchronous processing, and on-device computation to enhance performance and privacy preservation. In conclusion, this research establishes a robust framework for deploying PoseNet in web environments, underscoring its potential to revolutionize human-computer interaction within browser-based applications. Our findings contribute significantly to the field of computer vision and machine learning, offering insights into the practical deployment of pose estimation models on widely accessible platforms. Keywords — ReaReal-time Pose Estimation, TensorFlow.js, PoseNet, Machine Learning, Computer Vision, Browser-based Pose Detection, Human-Computer Interaction, Multi-person Tracking, On-device Computation, Asynchronous Processing, Cross-browser Compatibility, Performance Optimization, Privacy-preserving AI, Web-based Machine Learning, Motion Capture, Fitness Tracking, Interactive , Virtual Reality Interfaces, Deep LearningLearning
APA, Harvard, Vancouver, ISO, and other styles
44

Goode, Robert J. A., Simon Yu, Anitha Kannan, Jeffrey H. Christiansen, Anthony Beitz, William S. Hancock, Edouard Nice, and A. Ian Smith. "The Proteome Browser Web Portal." Journal of Proteome Research 12, no. 1 (December 5, 2012): 172–78. http://dx.doi.org/10.1021/pr3010056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ferdman, Sela, Einat Minkov, Ron Bekkerman, and David Gefen. "Quantifying the web browser ecosystem." PLOS ONE 12, no. 6 (June 23, 2017): e0179281. http://dx.doi.org/10.1371/journal.pone.0179281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Brown, Marc H., and Robert A. Shillner. "DeckScape: an experimental Web browser." Computer Networks and ISDN Systems 27, no. 6 (April 1995): 1097–104. http://dx.doi.org/10.1016/0169-7552(95)00036-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Shah, Ramya, Parag Shukla, Dr Digvijaysinh Rathod, Hitesh Sanghvi, and Yashrajsinh Zala. "Web Browser Forensics: Mozilla Firefox." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2024): 1. http://dx.doi.org/10.1504/ijesdf.2024.10055704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Roberts, Caroline, Jessica M. E. Herzing, Marc Asensio Manjon, Philip Abbet, and Daniel Gatica-Perez. "Response Burden and Dropout in a Probability-Based Online Panel Study – A Comparison between an App and Browser-Based Design." Journal of Official Statistics 38, no. 4 (December 1, 2022): 987–1017. http://dx.doi.org/10.2478/jos-2022-0043.

Full text
Abstract:
Abstract Survey respondents can complete web surveys using different Internet-enabled devices (PCs versus mobile phones and tablets) and using different software (web browser versus a mobile software application, “app”). Previous research has found that completing questionnaires via a browser on mobile devices can lead to higher breakoff rates and reduced measurement quality compared to using PCs, especially where questionnaires have not been adapted for mobile administration. A key explanation is that using a mobile browser is more burdensome and less enjoyable for respondents. There are reasons to assume apps should perform better than browsers, but so far, there have been few attempts to assess this empirically. In this study, we investigate variation in experienced burden across device and software in wave 1 of a three-wave panel study, comparing an app with a browser-based survey, in which sample members were encouraged to use a mobile device. We also assess device/software effects on participation at wave 2. We find that compared to mobile browser respondents, app respondents were less likely to drop out of the study after the first wave and the effect of the device used was mediated by subjective burden experienced during wave 1.
APA, Harvard, Vancouver, ISO, and other styles
49

Sunitharam, Dr C., Sayimpu Vinay, and Sannapaneni Anand. "Preserving Privacy and Security in Browser Case Study of Mantis Browser." International Journal of Soft Computing and Engineering 12, no. 1 (March 30, 2022): 1–4. http://dx.doi.org/10.35940/ijsce.a3544.0312122.

Full text
Abstract:
Abstract: The internet was meant to shorten the distance between the people to ground breaking level. It is essential tool for everyday task. But with this, internet service providers are allowed to share and sell their customers web browsing data without their concedence. sometimes, sold data makes security weakened and makes unprecedented way to spammers. With third party trackers, privacy gone under more risk factor, which makes no deterrent for Cyberattacks, terrorism and other phenomena. In today’s hig h tech environment organizations, Government and individual user has to use web browsers and internet for accessing web data. nowadays some Advertisers trying to mislead users. So, we propose a new way of browsing anonymously, untraceable web surfing and s trong firewall using new browser. There will be no bookmarks, Advertisements and no selling of data to marketers.
APA, Harvard, Vancouver, ISO, and other styles
50

Shoikhedbrod, Michael. "Using JavaScript in web design." BOHR International Journal of Engineering 2, no. 1 (2023): 7–14. http://dx.doi.org/10.54646/bije.2023.12.

Full text
Abstract:
JavaScript was created to bring a web page to life. Scripts are programs written in JavaScript. Each script is connected directly to HyperText Markup Language (HTML) in any browser and is immediately executed when the web page is loaded. JavaScript scripts are written in plain text that does not require special training, which is why JavaScript is very different from the Java programming language, to which it is very similar. A special interpreter program allows JavaScript to be used not only in the browser but anywhere, and therefore the process of executing script commands is called “interpretation.” The interpreter executes the program’s JavaScript ource code (script) “as is” in browsers. Modern interpreters convert JavaScript to machine code before execution, optimize it, and only then perform it. Because of this, JavaScript is very fast. All known browsers have a JavaScript interpreter built into them, which is why they can execute scripts on the page. However, JavaScript can be used outside of the browser. This is a full-fledged language, with programs that can be run on a server and even on consumer electronic devices, if they have the appropriate interpreter installed. This article presents various JavaScript applications, used by the author, embedded in HTML files that allow a web designer to make a text animation presentation on a web page, to make a slide show, to create a questionnaire with ready-made answers so that the user reading the web page can easily master the necessary material contained in the questionnaire, to conduct an exam with the user on any topic of interest to him or her in a multitask mode with assessments of the exam results and a table of correct answers, place scientific applications on the web page, for example, a table of chemical elements by Mendeleev with printing of all parameters of a chemical element at the request of the user or calculators that the user can use online. The author has managed to build HTML using JavaScript that allows displaying beautiful Java applets accompanied by a banner, designed as a Java applet, contained within a moving window that expands from the left end and moves to the right end at the top of the web page.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography