Artykuły w czasopismach na temat „Web browser”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Web browser.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Web browser”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Riggs, Colby. "New Web Browser Applications". Library Hi Tech News 21, nr 4 (1.04.2004): 11–12. http://dx.doi.org/10.1108/07419050410545870.

Pełny tekst źródła
Streszczenie:
Summarises new and developing Web browser technologies. Describes three browsers, one with a “tabbed browsing” capability, another which includes a new productivity tool called a “search information manager”, and a voice operated browser which is still in development.
Style APA, Harvard, Vancouver, ISO itp.
2

Kohana, Masaki, Shinji Sakamoto i Shusuke Okamoto. "Web Browser Network Based on a BA Model for a Web-Based Virtual World". Future Internet 11, nr 7 (5.07.2019): 147. http://dx.doi.org/10.3390/fi11070147.

Pełny tekst źródła
Streszczenie:
Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource utilization for web browsers. We improve upon the method in our previous study, which constructed a network for a web-based virtual world, using only location information. When a new user logged into a world, the web browser connected to two other browsers whose users had a location close to that of the user. The experimental results of that method showed 50% data coverage, which was insufficient to display the game screen because the web browser displays the characters on the virtual world. In this study, we attempt to use the BA model to construct more efficient networks than those in the previous study to increase data coverage. Our new method uses the number of connections of the web browser and location information to calculate the probability of web browser selection. The experimental results show that the data coverage exceeds 90%, indicating significant improvement over the previous method.
Style APA, Harvard, Vancouver, ISO itp.
3

Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR". Indonesian Journal of Business Intelligence (IJUBI) 1, nr 1 (15.02.2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.

Pełny tekst źródła
Streszczenie:
Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.
Style APA, Harvard, Vancouver, ISO itp.
4

Chen, Bo, i Gavriel Salvendy. "Design and Validation of a User-Centered Web Browser". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, nr 3 (październik 1998): 369–71. http://dx.doi.org/10.1177/154193129804200340.

Pełny tekst źródła
Streszczenie:
New user-centered features were proposed based on the analysis of human limitation in using web browsers. A conventional browser and an enhanced browser were built by using JavaScript and Common Gateway Interface (CGI) programming to rewrite the interface of Netscape Navigator. An experiment was conducted with 64 subjects to test four hypotheses concerning the relationship between search strategies and task types and the usability of the enhanced browser. Different search strategies are found between two tasks. Once the subjects became skilled at using the enhanced browser their performance was superior to using the conventional browser. In the enhanced browser, the subjects were more satisfied in using the reference window and the shopping list and less satisfied in using the pull back and the preview information than using the conventional browser.
Style APA, Harvard, Vancouver, ISO itp.
5

Sangani, K. "Web everywhere [Web browser]". Engineering & Technology 5, nr 16 (23.10.2010): 26–29. http://dx.doi.org/10.1049/et.2010.1604.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Andriamilanto, Nampoina, Tristan Allard, Gaëtan Le Guelvouit i Alexandre Garel. "A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication". ACM Transactions on the Web 16, nr 1 (28.02.2022): 1–62. http://dx.doi.org/10.1145/3478026.

Pełny tekst źródła
Streszczenie:
Modern browsers give access to several attributes that can be collected to form a browser fingerprint. Although browser fingerprints have primarily been studied as a web tracking tool, they can contribute to improve the current state of web security by augmenting web authentication mechanisms. In this article, we investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. These properties include their distinctiveness, their stability through time, their collection time, their size, and the accuracy of a simple verification mechanism. We assess these properties on a large-scale dataset of 4,145,408 fingerprints composed of 216 attributes and collected from 1,989,365 browsers. We show that, by time-partitioning our dataset, more than 81.3% of our fingerprints are shared by a single browser. Although browser fingerprints are known to evolve, an average of 91% of the attributes of our fingerprints stay identical between two observations, even when separated by nearly six months. About their performance, we show that our fingerprints weigh a dozen of kilobytes and take a few seconds to collect. Finally, by processing a simple verification mechanism, we show that it achieves an equal error rate of 0.61%. We enrich our results with the analysis of the correlation between the attributes and their contribution to the evaluated properties. We conclude that our browser fingerprints carry the promise to strengthen web authentication mechanisms.
Style APA, Harvard, Vancouver, ISO itp.
7

Singh, Shailendra, Prashant Bhardwaj i Mohammed Abdul Qadeer. "Neo Browser: Java Based Web Browser for Mobile Phones". International Journal of Engineering and Technology 4, nr 6 (2012): 817–20. http://dx.doi.org/10.7763/ijet.2012.v4.491.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bhadarage, Shubham. "Browser Security". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (27.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.

Pełny tekst źródła
Streszczenie:
Web browsers play a crucial role in accessing and interacting with information on the internet. However, they also present significant security challenges due to their complexity and the diverse range of threats they face. This paper provides an overview of web browser security, focusing on the key challenges, vulnerabilities, and defences. It discusses common attack vectors, such as cross-site scripting (XSS) and cross-site request forgery (CSRF), as well as browser security features like sandboxing, secure storage, and Content Security Policy (CSP). Additionally, the paper explores emerging threats and future directions in web browser security, highlighting the importance of ongoing research and collaboration among browser vendors, developers, and security experts to ensure a more secure browsing experience for users.
Style APA, Harvard, Vancouver, ISO itp.
9

Queiroz, Jordan S., i Eduardo L. Feitosa. "A Web Browser Fingerprinting Method Based on the Web Audio API". Computer Journal 62, nr 8 (22.01.2019): 1106–20. http://dx.doi.org/10.1093/comjnl/bxy146.

Pełny tekst źródła
Streszczenie:
Abstract Web Browser Fingerprinting is a process in which the users are, with high likelihood, uniquely identified by the extracted features from their devices, generating an identifier key (fingerprint). Although it can be used for malicious purposes, especially regarding privacy invasion, Web Browser Fingerprinting can also be used to enhance security (e.g. as a factor in two-factor authentication). This paper investigates the use of Web Audio API as a Web Browser Fingerprinting method capable of identifying the devices. The idea is to prove or not if audio can provide features capable to identify users and devices. Our initial results show that the proposed method is capable of identifying the device’s class, based on features like device’s type, web browser’s version and rendering engine.
Style APA, Harvard, Vancouver, ISO itp.
10

Zadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda i Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS". Cybersecurity: Education, Science, Technique 3, nr 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.

Pełny tekst źródła
Streszczenie:
The distribution of the vast majority of web browsers is actively encouraged by their free use. This is a common practice of web browser developers, as it provides them with great opportunities for their distribution. The flip side of this process is the collection of personal data by web browser developers that the user does not control. The collected data is automatically transferred to leading IT companies such as Google, Microsoft, and Cloudflare, which collect, accumulate, process, and monetize the users’ data in an automated manner. This leads to the fact that any web browser user is profiled in the services of leading IT companies, which receive complete information about the user's actions on the Internet. This state of affairs contradicts Article 32 of the Constitution of Ukraine, which guarantees the right to privacy and the basic provisions of the Law of Ukraine "On Personal Data Protection". The study involved long-term recording and subsequent analysis of the network traffic of Ukraine's most popular web browsers: Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera. The peculiarity of the study was to obtain network traffic initiated by web browsers that have been active for a long time. To increase the reliability, the data on network connections of web browsers were obtained using two independent software tools for monitoring traffic on the network interface of a communication device. The analysis of network connections of web browsers made it possible to establish close ties between companies developing free web browsers and leading IT companies that monopolistically control the actions of users in the Internet space. This state of affairs contradicts the legal norms on ensuring the privacy of web browser users in the context of using their data without their knowledge and consent. This can be prevented using network screens operating at Layers 3, 4, and 7 of the TCP/IP stack OSI model.
Style APA, Harvard, Vancouver, ISO itp.
11

SahinurHossen, Mohammad, Rakibul Islam, Md Nasef Ur Rahman Chowdhury, Ahshanul Haque i Qudrat E. Alahy Ratul. "Malware Detection in Web Browser Plugins Using API Calls with Permissions". International Journal of Advanced Networking and Applications 14, nr 06 (2023): 5672–77. http://dx.doi.org/10.35444/ijana.2023.14603.

Pełny tekst źródła
Streszczenie:
With the exponential growth of internet users, web browsers play an essential role in gathering knowledge, social networking etc. Browser plugin/add-on is a unique feature of modern browsers that allows for adding new gimmicks to the browser functionality. Although this tool is handy, it poses a significant risk as it can collect and store users browsing history, passwords and more. Hence, attackers can try injecting malicious browser add-ons that can utilize security loopholes wherein the attacker may access user-critical data on the host device. The Smart Extension Malware Detector (SEMD), a reliable browser malware detection system that relies on extension development API calls and privileges using outfit machine learning approaches, was suggested and created by us. The research outcomes demonstrate that the SEMD model outperformed peer models while lowering the difficulty of the detection procedure.
Style APA, Harvard, Vancouver, ISO itp.
12

정동훈 i Choi, Junho. "Mobile Web Browser Testing - Full Browser vs. WAP Browser -". Journal of Digital Design 10, nr 1 (styczeń 2010): 287–95. http://dx.doi.org/10.17280/jdd.2010.10.1.028.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Şah, Melike, i Wendy Hall. "Dynamic Linking and Personalization on the Web using Linked Open Data". International Journal on Semantic Web and Information Systems 9, nr 2 (kwiecień 2013): 31–61. http://dx.doi.org/10.4018/jswis.2013040102.

Pełny tekst źródła
Streszczenie:
This paper presents a novel Semantic Web browser, called SemWeB. SemWeB supports Web browsing using Linked Open Data and personalization. This is the first time a Semantic Web browser combines the advances in Adaptive Hypermedia (i.e. personalization) and Linked Open Data. In particular, users are provided with a personalized and semantically rich Web browsing experience. For example, SemWeB supplies goal-based adaptive information retrieval from the LOD, adaptive link recommendation using a novel semantic relatedness measure and adaptive content creation. A user based study was used to assess the value of LOD-based hyperlinks and personally relevant content compared with a standard Web browser (Firefox). Results showed that users were able to browse and view more relevant information, as well as, value significance of LOD-based hyperlinks and personalized content in comparison to a standard Web browser.
Style APA, Harvard, Vancouver, ISO itp.
14

Baran, Erkan, Huseyin Çakır i Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi". International Journal of Human Sciences 12, nr 2 (16.09.2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.

Pełny tekst źródła
Streszczenie:
<p>Nowadays, web browser tools are seen ıntensıvely durıng the usage of web applıcatıons. Because of that, browsers provıdes ınfrastructure of a largo majorıty of crımes. Because guılty or suspect can use the browsers to collect ınformatıons, to hıde hıs crıme, learn new crımınal methods or to apply they have learned. In thıs study, ıt ıs also seeked answers of how a process can be monıtored on the computers whıch are used on browsers, ın whıch fıles whıch datas are looked and when and whıch sıtes are accessed. Accordıng to research of W3counter web stats tool, Chrome Web browser, whıch has %43 persentage of across the world ın usage, ıs proses as the most demanded browser ın thıs study by users, and ıt ıs scented out ın thıs browser's related fıles. In these days, ''hıdden mode'' whıch take part ın vast majorıty of browsers ıs also examıned. Thıs feature of the browser, whıch ıs receıved reference, ıs tracked by testıng and ıs sought data ın RAM memory and fıle systems. Thus, '' hıdden mode'' effects are dıscussed ın provıdıng studıes about suspect or crımınal posıtıon people, what kınd of data can be obtaıned ın usıng '' hıdden mode” ıs revealed.</p><p> </p><p><strong>Özet</strong></p><p>Günümüzde internet uygulamalarının kullanımı sırasında web tarayıcı araçlarının yoğun bir şekilde kullanımı görülmektedir. Bu nedenle tarayıcılar, işlenen suçların büyük bir çoğunluğuna altyapı sağlar. Çünkü suçlu ya da şüpheli, tarayıcıları bilgi toplamak, suçunu gizlemek, yeni suç metotları öğrenmek ya da öğrendiklerini uygulamak için kullanabilir. Bu çalışmada da tarayıcıların kullanıldığı bilgisayarlar üzerinde bırakılan izlerin tespitinde nasıl bir süreç izlenebileceği, hangi dosyalarda hangi verilere bakılabileceği ve ne zaman hangi sitelere erişim sağlandığı gibi çeşitli sorulara cevaplar aranmaktadır. w3counter adlı internet istatistik aracının yaptığı araştırmaya göre, dünya genelinde %43'lük bir kullanım alanına sahip olan Chrome web tarayıcısı, kullanıcılar tarafından en çok talep gören tarayıcı olarak bu araştırma içinde referans alınmaktadır ve bu tarayıcıya ait ilgili dosyalarda izler sürülmektedir. Ayrıca günümüz tarayıcıların büyük bir çoğunluğunda yer alan “<strong>gizli mod</strong>” özelliği incelenmektedir. Referans alınan tarayıcının bu özelliği test edilerek iz sürülmekte, dosya sistemlerinde ve RAM bellekte veri aranmaktadır.Böylelikle “gizli mod” kullanımında ne tür veriler elde edilebileceği ortaya konarak şüpheli ya da suçlu konumundaki kişilere ait delillendirme çalışmalarında “gizli mod” kullanımının etkileri tartışılmaktadır. </p>
Style APA, Harvard, Vancouver, ISO itp.
15

Kurako, E. A., R. E. Asratian i V. L. Orlov. "Service Browser in Linux Environment". Programmnaya Ingeneria 15, nr 5 (21.05.2024): 219–28. http://dx.doi.org/10.17587/prin.15.219-228.

Pełny tekst źródła
Streszczenie:
The key features of using web browsers and service browsers as clients of information systems are considered. A minimal set of methods has been defined that is sufficient for the effective support of client functioning. A comparison is made of the main methods that a browser used as a universal means of providing client applications should include. The basic steps of the service-browser algorithm are presented. The service browser has the full range of necessary ways to process information from the client. At the same time, it is more lightweight than a web browser. However, well-known service browsers operate in a Windows environment, which limits the scope of use. The possibility of transferring and using a C#-based service browser from a Windows environment to a Linux environment is considered. The base problems with the transfer are described. Migration methods are proposed. Using the example of the service module "System Manager", which is actually identical in both systems, a comparative analysis of the work was carried out. In order to estimate only the operating time of the service-browser components, a unified database management system is used. The launch of the main modules in the Linux environment is somewhat faster, which is explained by the features of GTK widgets. At the same time, in the Windows environment, it is much easier to develop systems with a complex graphical interface due to a richer palette of visual components. Existing web browsers are quite cumbersome and contain many functions that may be unnecessary for the development of information systems. A compact solution that includes all the necessary methods for use in the client is to use a service-browser. This paper proposes a method for building service browsers in the Linux environment based on the C# language and the Mono package, taking into account the developed additional components.
Style APA, Harvard, Vancouver, ISO itp.
16

Sy, Erik, Christian Burkert, Hannes Federrath i Mathias Fischer. "A QUIC Look at Web Tracking". Proceedings on Privacy Enhancing Technologies 2019, nr 3 (1.07.2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.

Pełny tekst źródła
Streszczenie:
Abstract QUIC has been developed by Google to improve the transport performance of HTTPS traffic. It currently accounts for approx. 7% of the global Internet traffic. In this work, we investigate the feasibility of user tracking via QUIC from the perspective of an online service. Our analysis reveals that the protocol design contains violations of privacy best practices through which a tracker can passively and uniquely identify clients across several connections. This tracking mechanisms can achieve reduced delays and bandwidth requirements compared to conventional browser fingerprinting or HTTP cookies. This allows them to be applied in resource- or time-constrained scenarios such as real-time biddings in online advertising. To validate this finding, we investigated browsers which enable QUIC by default, e.g., Google Chrome. Our results suggest that the analyzed browsers do not provide protective measures against tracking via QUIC. However, the introduced mechanisms reset during a browser restart, which clears the cached connection data and thus limits achievable tracking periods. To mitigate the identified privacy issues, we propose changes to QUIC’s protocol design, the operation of QUIC-enabled web servers, and browser implementations.
Style APA, Harvard, Vancouver, ISO itp.
17

Cassel, Darion, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia i Timothy Libert. "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers". Proceedings on Privacy Enhancing Technologies 2022, nr 1 (20.11.2021): 227–52. http://dx.doi.org/10.2478/popets-2022-0012.

Pełny tekst źródła
Streszczenie:
Abstract Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mobile browsers. Our study leverages a new web measurement infrastructure, OmniCrawl, which we develop to drive browsers on desktop computers and smartphones located on two continents. We capture web tracking measurements using 42 different non-emulated browsers simultaneously. We find that the third-party advertising and tracking ecosystem of mobile browsers is more similar to that of desktop browsers than previous findings suggested. We study privacy-focused browsers and find their protections differ significantly and in general are less for lower-ranked sites. Our findings also show that common methodological choices made by web measurement studies, such as the use of emulated mobile browsers and Selenium, can lead to website behavior that deviates from what actual users experience.
Style APA, Harvard, Vancouver, ISO itp.
18

Bensch, Michael, Ahmed A. Karim, Jürgen Mellinger, Thilo Hinterberger, Michael Tangermann, Martin Bogdan, Wolfgang Rosenstiel i Niels Birbaumer. "Nessi: An EEG-Controlled Web Browser for Severely Paralyzed Patients". Computational Intelligence and Neuroscience 2007 (2007): 1–5. http://dx.doi.org/10.1155/2007/71863.

Pełny tekst źródła
Streszczenie:
We have previously demonstrated that an EEG-controlled web browser based on self-regulation of slow cortical potentials (SCPs) enables severely paralyzed patients to browse the internet independently of any voluntary muscle control. However, this system had several shortcomings, among them that patients could only browse within a limited number of web pages and had to select links from an alphabetical list, causing problems if the link names were identical or if they were unknown to the user (as in graphical links). Here we describe a new EEG-controlled web browser, called Nessi, which overcomes these shortcomings. In Nessi, the open source browser, Mozilla, was extended by graphical in-place markers, whereby different brain responses correspond to different frame colors placed around selectable items, enabling the user to select any link on a web page. Besides links, other interactive elements are accessible to the user, such as e-mail and virtual keyboards, opening up a wide range of hypertext-based applications.
Style APA, Harvard, Vancouver, ISO itp.
19

Kakar, Abdul Sattar, i Muhammad Sadiq Rohie. "A Review of Probabilistic Techniques Used for Web browsers’ Caching". European Journal of Engineering Research and Science 5, nr 7 (6.07.2020): 773–80. http://dx.doi.org/10.24018/ejers.2020.5.7.1976.

Pełny tekst źródła
Streszczenie:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and recommend various techniques for this purpose. This study consequently reviews the recent likelihood probabilistic methods, to figure out how browsers store web objects in their caches, and which methods are used to load more speedily and to store a great number of web objects. The comparison between numerous browsers performed to pick and recommend the utmost one for usage. The result has shown that each browser using RI (Ratio Improvement) has powerful performance; to be discussed later. It has proposed using Google Chrome browser because web objects are placed in its cache through the RI technique that correlated with browsers' effectiveness.
Style APA, Harvard, Vancouver, ISO itp.
20

Kakar, Abdul Sattar, i Muhammad Sadiq Rohie. "Review of Probabilistic Techniques Used for Web browsers’ Caching". European Journal of Engineering and Technology Research 5, nr 7 (6.07.2020): 773–80. http://dx.doi.org/10.24018/ejeng.2020.5.7.1976.

Pełny tekst źródła
Streszczenie:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and recommend various techniques for this purpose. This study consequently reviews the recent likelihood probabilistic methods, to figure out how browsers store web objects in their caches, and which methods are used to load more speedily and to store a great number of web objects. The comparison between numerous browsers performed to pick and recommend the utmost one for usage. The result has shown that each browser using RI (Ratio Improvement) has powerful performance; to be discussed later. It has proposed using Google Chrome browser because web objects are placed in its cache through the RI technique that correlated with browsers' effectiveness.
Style APA, Harvard, Vancouver, ISO itp.
21

Hasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J i Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities". Journal of Forensic Science and Research 5, nr 1 (8.03.2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.

Pełny tekst źródła
Streszczenie:
Forensic analysts are more than ever facing challenges upon conducting their deep investigative analysis on digital devices due to the technological progression. Of these are the difficulties present upon analyzing web browser artefacts as this became more complicated when web browser companies introduced private browsing mode, a feature aiming to protect users’ data upon opening a private browsing session, by leaving no traces of data on the local device used. Aiming to investigate whether the claims of web browser companies are true concerning the protection private browsing provides to the users and whether it really doesn’t leave any browsing data behind, the most popular desktop browsers in Windows were analyzed after surfing them regularly and privately. The results shown in this paper suggest that the privacy provided varies among different companies since evidence might be recovered from some of the browsers but not from others.
Style APA, Harvard, Vancouver, ISO itp.
22

Fajar, Abdullah, Setiadi Yazid, . i . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, nr 4.44 (1.12.2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.

Pełny tekst źródła
Streszczenie:
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnerability. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Firefox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time.
Style APA, Harvard, Vancouver, ISO itp.
23

Niakanlahiji, Amirreza, i Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense". Security and Communication Networks 2019 (14.05.2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.

Pełny tekst źródła
Streszczenie:
Existing mitigation techniques for cross-site scripting attacks have not been widely adopted, primarily due to imposing impractical overheads on developers, Web servers, or Web browsers. They either enforce restrictive coding practices on developers, fail to support legacy Web applications, demand browser code modification, or fail to provide browser backward compatibility. Moving target defense (MTD) is a novel proactive class of techniques that aim to defeat attacks by imposing uncertainty in attack reconnaissance and planning. This uncertainty is achieved by frequent and random mutation (randomization) of system configuration in a manner that is not traceable (predictable) by attackers. In this paper, we present WebMTD, a proactive moving target defense mechanism that thwarts various kinds of cross-site scripting (XSS) attacks on Web applications. Relying on built-in features of modern Web browsers, WebMTD randomizes values of certain attributes of Web elements to differentiate the application code from the injected code and disallow its execution; this is done without requiring Web developer involvement or browser code modification. Through rigorous evaluation, we show that WebMTD has very a low performance overhead. Also, we argue that our technique outperforms all competing approaches due to its broad effectiveness, transparency, backward compatibility, and low overhead.
Style APA, Harvard, Vancouver, ISO itp.
24

El-Tayeb, Mahmoud, Ahmed Taha i Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics". Ingénierie des systèmes d information 26, nr 4 (31.08.2021): 337–44. http://dx.doi.org/10.18280/isi.260401.

Pełny tekst źródła
Streszczenie:
In criminal investigations, the digital evidence extracted from social media may provide exceptional support. Reviewing the history or cache of the web browser may provide a valuable insight into the activity of the suspect. The growing popularity of Internet video streaming creates a risk of this technology misuse. There are a few published research on video reconstruction forensics on the Chrome browser. There is a difference in the methods applied to reconstruct cached video on Chrome from the methods applied to Firefox or any browser. Our primary focus in this research is to examine the forensic procedures required to reconstruct cached video stream data using Twitter and YouTube on the Firefox browser. Some work has been done to reconstruct a cached video on the Chrome browser, but we need more work on the rest of the browsers, most notably the Firefox browser used in this research. Both examination strategies and contemplations displayed are approved and suitable for the forensic study of various streaming platforms as well as the web browser caches.
Style APA, Harvard, Vancouver, ISO itp.
25

Brindha.S, Brindha S. "Developing Web Browser-Jan". IOSR Journal of Computer Engineering 10, nr 2 (2013): 75–78. http://dx.doi.org/10.9790/0661-01027578.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Gifford, Atticus, Benjamin J. Menasha i David Finkel. "The visible Web browser". ACM SIGCSE Bulletin 31, nr 3 (wrzesień 1999): 209. http://dx.doi.org/10.1145/384267.305959.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Abdiati, Agustia Dwi, Santoso Setiawan i Hendra Supendar. "Pemilihan Web Browser Pada Mobile Menggunakan Metode Analytical Hierachy Process". Jurnal Infortech 3, nr 1 (15.06.2021): 26–32. http://dx.doi.org/10.31294/infortech.v3i1.10298.

Pełny tekst źródła
Streszczenie:
Kenyamanan dalam berinternet didukung oleh web browser yang digunakan. Web browser adalah perangkat lunak (software) yang digunakan untuk berselancar dalam dunia internet. Berkat kemajuan teknologi, saat ini web browser dapat digunakan pada mobile. Hal tersebut menjadikan para pengembang web bersaing untuk berinovasi menciptakan web browser yang dapat digunakan pada mobile. Dengan banyaknya pilihan yang ada, menjadikan para pengguna web browser bingung. Web browser apa yang terbaik untuk digunakan pada mobile dan sesuai dengan keinginan. Hal ini menjadi latar belakang penelitian, bagaimana menerapkan metode Analytical Hierarchy Process (AHP) untuk memilih web browser pada mobile. Penelitian ini bertujuan membuat sistem pendukung keputusan bagi pengguna internet, dalam menentukan pilihan mobile web browser yang tepat sesuai kriteria.
Style APA, Harvard, Vancouver, ISO itp.
28

Zhou, Chijin, Quan Zhang, Lihua Guo, Mingzhe Wang, Yu Jiang, Qing Liao, Zhiyong Wu, Shanshan Li i Bin Gu. "Towards Better Semantics Exploration for Browser Fuzzing". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16.10.2023): 604–31. http://dx.doi.org/10.1145/3622819.

Pełny tekst źródła
Streszczenie:
Web browsers exhibit rich semantics that enable a plethora of web-based functionalities. However, these intricate semantics present significant challenges for the implementation and testing of browsers. For example, fuzzing, a widely adopted testing technique, typically relies on handwritten context-free grammars (CFGs) for automatically generating inputs. However, these CFGs fall short in adequately modeling the complex semantics of browsers, resulting in generated inputs that cover only a portion of the semantics and are prone to semantic errors. In this paper, we present SaGe, an automated method that enhances browser fuzzing through the use of production-context sensitive grammars (PCSGs) incorporating semantic information. Our approach begins by extracting a rudimentary CFG from W3C standards and iteratively enhancing it to create a PCSG. The resulting PCSG enables our fuzzer to generate inputs that explore a broader range of browser semantics with a higher proportion of semantically-correct inputs. To evaluate the efficacy of SaGe, we conducted 24-hour fuzzing campaigns on mainstream browsers, including Chrome, Safari, and Firefox. Our approach demonstrated better performance compared to existing browser fuzzers, with a 6.03%-277.80% improvement in edge coverage, a 3.56%-161.71% boost in semantic correctness rate, twice the number of bugs discovered. Moreover, we identified 62 bugs across the three browsers, with 40 confirmed and 10 assigned CVEs.
Style APA, Harvard, Vancouver, ISO itp.
29

Oktavianita, Annisa Dwi, Hendra Dea Arifin, Muhammad Dzulfikar Fauzi i Aulia Faqih Rifa'i. "An Analysis of Memory Usage in Web Browser Software". IJID (International Journal on Informatics for Development) 5, nr 2 (26.12.2016): 21. http://dx.doi.org/10.14421/ijid.2016.05204.

Pełny tekst źródła
Streszczenie:
A RAM or formerly known as a memory is a primary memory which helps swift data availability without waiting the whole data processed by the hard disk. A memory is also used by all installed applications including web browsers but there have been disappointed in cases of memory usages. Researchers use a descriptive quantitative approach with an observation, a central tendency and a dispersion method. There are 15 browsers chosen by random to be tested with low, medium and high loads to get their memory usage logs. Researchers proceed to analyze the log by using descriptive statistics to measure the central tendency and dispersion of data. A standard reference value from web application memory usage has been found as much as 393.38 MB. From that point, this research is successful and has been found the result. The web browser with the lowest memory usage is Flock with 134.67 MB and the web browser with the highest memory usage is Baidu with 699.66 MB.
Style APA, Harvard, Vancouver, ISO itp.
30

Kletz, Sabrina, Marco Bertini i Mathias Lux. "Open source column: Deep learning in the browser". ACM SIGMultimedia Records 11, nr 1 (marzec 2019): 1. http://dx.doi.org/10.1145/3458462.3458466.

Pełny tekst źródła
Streszczenie:
Having already discussed MatConvNet and Keras, let us continue with an open source framework for deep learning, which takes a new and interesting approach. TensorFlow.js is not only providing deep learning for JavaScript developers, but it's also making applications of deep learning available in the WebGL enabled web browsers, or more specifically, Chrome, Chromium-based browsers, Safari and Firefox. Recently node.js support has been added, so TensorFlow.js can be used to directly control TensorFlow without the browser. TensorFlow.js is easy to install. As soon as a browser is installed one is ready to go. Browser based, cross platform applications, e.g. running with Electron, can also make use of TensorFlow.js without an additional install. The performance, however, depends on the browser the client is running, and memory and GPU on the client device. More specifically, one cannot expect to analyze 4K videos on a mobile phone in real time. While it's easy to install, and it's easy to develop based on TensorFlow.js, there are drawbacks: (i) developers have less control over where the machine learning actually takes place (e.g. on CPU or GPU), that it is running in the same sandbox as all web pages in the browser do, and (ii) that in the current release it still has rough edges and is not considered stable enough to use in production.
Style APA, Harvard, Vancouver, ISO itp.
31

Liu, Wen Tao. "Research on Offline Storage of Web Page". Applied Mechanics and Materials 518 (luty 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.518.305.

Pełny tekst źródła
Streszczenie:
Offline storage technology has many uses in the Web application and it can store the user status, cache data, temporary data, and persistent data and so on. In this paper several typical web client storage technologies are discussed and it includes the IE browser's unique storage technology UserData, localStorage and sessionStorage of HTML5, Web SQL Databases, Indexed Database, as well as classic storage technology Cookie and so on. Their concrete using methods are explained and their individual strengths and differences are compared. Their respective applications occasions and some issues that need attention are discussed. The general cross-browser offline storage method is presented and it can use the same application programming interface to complete different browser offline storage technologies.
Style APA, Harvard, Vancouver, ISO itp.
32

Gannouni, Sofien, Nourah Alangari, Hassan Mathkour, Hatim Aboalsamh i Kais Belwafi. "BCWB". International Journal on Semantic Web and Information Systems 13, nr 2 (kwiecień 2017): 55–73. http://dx.doi.org/10.4018/ijswis.2017040104.

Pełny tekst źródła
Streszczenie:
Web access and web resources open many horizons, their usage increases in all life aspects including government, education, commerce and entertainment, where the key to such resources lies in Web browsers. Acknowledging the importance of universal accessibility to web resources, the W3C has developed a series of guidelines into a Web Accessibility Initiative (WAI), with the goal of providing access to web resources for people with disabilities. In order to bridge the gap in the digital divide between the disabled and the non-disabled people, the authors believe that the development of novel assistive technologies using new human-computer interfaces will go a long way towards achieving this lofty goal. In this paper, they present a P300 Electroencephalography Brain-controlled Web browser to enhance the accessibility of people with severe motor disabilities to Web resources. It enhances their interaction with the Web taking their needs into account. The proposed Web browser satisfies the Mankoff's requirements of a system that would “allow true web access.”
Style APA, Harvard, Vancouver, ISO itp.
33

Paes, Fagner Christian, i Willian Massami Watanabe. "Detecção Automática de Incompatibilidades Cross-Browser utilizando Redes Neurais Artificiais". Journal on Advances in Theoretical and Applied Informatics 2, nr 2 (21.12.2016): 55. http://dx.doi.org/10.26729/jadi.v2i2.2109.

Pełny tekst źródła
Streszczenie:
Cross-Browser Incompatibilities (XBIs) represent inconsistencies in Web Application when introduced in different browsers. The growing number of implementation of browsers (Internet Explorer, Microsoft Edge, Mozilla Firefox, Google Chrome) and the constant evolution of the specifications of Web technologies provided differences in the way that the browsers behave and render the web pages. The web applications must behave consistently among browsers. Therefore, the web developers should overcome the differences that happen during the rendering in different environments by detecting and avoiding XBIs during the development process. Many web developers depend on manual inspection of web pages in several environments to detect the XBIs, independently of the cost and time that the manual tests represent to the process of development. The tools for the automatic detection of the XBIs accelerate the inspection process in the web pages, but the current tools have little precision, and their evaluations report a large percentage of false positives. This search aims to evaluate the use of Artificial Neural Networks for reducing the numbers of false positives in the automatic detection of the XBIs through the CSS (Cascading Style Sheets) and the relative comparison of the element in the web page.
Style APA, Harvard, Vancouver, ISO itp.
34

Ray, Loye Lynn. "Countering Cross-Site Scripting in Web-based Applications". International Journal of Strategic Information Technology and Applications 6, nr 1 (styczeń 2015): 57–68. http://dx.doi.org/10.4018/ijsita.2015010105.

Pełny tekst źródła
Streszczenie:
Today's dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security project (OWASP) top ten web-threats. XSS occurs when a Web-based application allows untrusted information be accepted and sent back to a browser. Also they can execute scripts within a browser that can deface web sites, redirect users to malicious content and hijack browsers. One reason for this problem was the lack of developers understanding the causes of XSS. In this paper, the authors address the causes of XSS and countermeasures to defense against these threats.
Style APA, Harvard, Vancouver, ISO itp.
35

Zalipynis, Ramon Antonio Rodriges, i Nikita Terlych. "WebArrayDB". Proceedings of the VLDB Endowment 15, nr 12 (sierpień 2022): 3622–25. http://dx.doi.org/10.14778/3554821.3554859.

Pełny tekst źródła
Streszczenie:
Geospatial array DBMSs operate on georeferenced N -d arrays. They provide storage engines, query parsers, and processing capabilities as their core functionality. Traditionally, those have been too heavy for a Web browser to support. Hence, Web Applications, mostly Geographic Information Systems (GISs), run array management on their server back-ends that return small portions of the results via the network. We showcase WebArrayDB, the first geospatial array DBMS that can run completely inside a Web browser. We demonstrate that modern Web browsers, JavaScript, and respective software libraries are sufficiently mature to build and run such a feature-rich and powerful DBMS. A Web-based array DBMS should reduce server load, enable offline work, decrease network I/O, and improve user experience. We also present ArrayGIS, our new Web GIS based on WebArrayDB, and invite everyone to explore both via a freely accessible, informative, and interactive Web GUI.
Style APA, Harvard, Vancouver, ISO itp.
36

Shoikhedbrod, Michael. "Internet of Things and JavaScript". Journal of IoT and Machine Learning 1, nr 1 (2023): 1–11. http://dx.doi.org/10.48001/joitml.2023.111-11.

Pełny tekst źródła
Streszczenie:
The Internet of Things is the concept of a data network between devices (things) smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives images from these cameras on the host device, in the method of embedded JavaScript of the Internet of Things, which is the implementation of JavaScript codes from the web page of the Internet browser on specific devices, such as smartphones. This article provides examples of the implementation of JavaScript codes from the developed web page of the Internet browser, used by the author, which allow implementing the developed web applications on smartphones.
Style APA, Harvard, Vancouver, ISO itp.
37

Shoikhedbrod, Michael. "Internet of Things and JavaScript". Journal of IoT and Machine Learning 1, nr 1 (10.02.2024): 1–8. http://dx.doi.org/10.48001/joitml.2024.111-8.

Pełny tekst źródła
Streszczenie:
The Internet of Things is the concept of a data network between devices ("things"): smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives images from these cameras on the host device, in the method of embedded JavaScript of the Internet of Things, which is the implementation of JavaScript codes from the web page of the Internet browser on specific devices, such as smartphones. This article provides examples of the implementation of JavaScript codes from the developed web page of the Internet browser, used by the author, which allow implementing the developed web applications on smartphones.
Style APA, Harvard, Vancouver, ISO itp.
38

Shukla, Abhishek. "Comparative Analysis of Webkit and Non-Webkit Based Browsers and their Future". Journal of Mathematical & Computer Applications 2, nr 4 (31.12.2023): 1–3. http://dx.doi.org/10.47363/jmca/2023(2)130.

Pełny tekst źródła
Streszczenie:
Web browsers have become an integral part of our daily lives, facilitating access to the vast world of information on the internet. While several web browsers are available, they can be broadly categorized into two groups: WebKit-based and non-WebKit-based browsers. This article provides a comprehensive comparative analysis of these two browser categories, discussing their origins, development, key features, and market share, as well as what the future looks like for both of these categories.
Style APA, Harvard, Vancouver, ISO itp.
39

Jung, Won-Chi, i Namje Park. "A Safe Web in Network Separation Environment". Journal of Computational and Theoretical Nanoscience 17, nr 7 (1.07.2020): 3243–49. http://dx.doi.org/10.1166/jctn.2020.9168.

Pełny tekst źródła
Streszczenie:
This paper describes a technique for constructing network separation and proposes a method for providing convenience to users by using it. This paper analyzes the background of the Korean government’s adoption of the network separation policy. And there are various techniques for configuring network separation. NAC, media control solution and file transfer system are essential for network separation. Because just running two networks does not guarantee secure. This paper considers ways to provide efficiency and convenience to the extent allowed by the network separation policy. In this paper, Using Headless Browser, transform web pages into electronic documents. The converted electronic document does not contain malicious code. Several Headless browser packages were used to implement and test assuming a virtual network separation. Web scraping technology worked reliably, almost all browsers can read and display PDF file. In this paper, we have defined a safe web prototype in a network separation environment.
Style APA, Harvard, Vancouver, ISO itp.
40

Zhou, Jian-Zhong (Joe). "The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers". Information Technology and Libraries 19, nr 1 (17.09.2017): 50–52. http://dx.doi.org/10.6017/ital.v19i1.10075.

Pełny tekst źródła
Streszczenie:
This article first examines the difference between two very familiar and sometimes synonymous terms, the Internet and the Web. The article then explains the relationship between the Web's protocol HTTP and other high-level Internet protocols, such as Telnet and FTP, as well as provides a brief history of Web development. Next, the article analyzes the mechanism in which a Web browser (client) "talks" to a Web server on the Internet. Finally, the article studies the market growth for Web browsers and Web servers between 1993 and 1999. Two statistical sources were used in the Web market analysis: a survey conducted by the University of Delaware Libraries for the 122 members of the Association of Research Libraries, and the data for the entire Web industry from different Web survey agencies.
Style APA, Harvard, Vancouver, ISO itp.
41

Leith, Douglas J. "Web Browser Privacy: What Do Browsers Say When They Phone Home?" IEEE Access 9 (2021): 41615–27. http://dx.doi.org/10.1109/access.2021.3065243.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Rahmatulloh, Alam, Andi Nur Rachman i Fahmi Anwar. "Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS". Jurnal Teknologi Informasi dan Ilmu Komputer 6, nr 3 (9.05.2019): 327. http://dx.doi.org/10.25126/jtiik.201963936.

Pełny tekst źródła
Streszczenie:
<p class="Abstrak">Teknologi terus menerus berkembang, berbagai jenis teknologi terus bermunculan seperti sistem informasi manajemen arsip, masalahnya para pekerja kadang melakukan pekerjaan lain di komputer sehingga arsip tidak terkontrol. Penerapan <em>Web Push Notification</em> dapat menampilkan pemberitahuan berbasis <em>website</em> meskipun tidak membuka <em>web browser</em> secara langsung atau dalam kondisi <em>minimize</em>. <em>Web Push Notification</em> merupakan mekanisme pemberitahuan menggunakan <em>Javascript</em> pada <em>web browser</em>. Fitur ini tersedia dalam <em>Push API HTML5</em> dengan menggunakan <em>Push Service</em> atau <em>Messaging server</em> yang mengirim pemberitahuan ke <em>web browser</em> yang telah berlangganan tanpa membuka <em>website</em> sehingga dapat melakukan <em>broadcast message</em> dan <em>Notification API HTML5</em> tidak memerlukan <em>Push Service</em> atau <em>Messaging server</em> tetapi harus membuka <em>website</em>, tetapi belum didukung semua <em>web browser</em> sehingga pada makalah ini dibahas Implementasi <em>Web Push Notification</em> pada sistem informasi manajemen arsip menggunakan <em>PushJS</em>, metode pengembangan yang digunakan adalah <em>Rational Unified Proccess (RUP)</em>. Teknologi pemberitahuan yang cocok untuk sistem informasi manajemen arsip berbasis <em>web</em> yaitu <em>Notification API HTML5</em> karena tidak akan mengirim pemberitahuan yang sama ke semua pengguna. Namun tidak ada proses di belakang layar sehingga tidak akan dijalankan secara otomatis, masalah tersebut diatasi dengan menggunakan <em>AJAX</em> dengan mengambil <em>JSON</em> kemudian dijalankan berulang-ulang pada <em>web browser</em> dan meminimalisir bentrokan antara <em>script web push notification</em> di <em>multi tab window</em> atau <em>window web browser</em> diatasi menggunakan <em>localStorage</em> dari <em>WebStorage API HTML5</em>. Hasil uji menunjukan bahwa penerapan teknologi <em>Web Push Notification</em> pada Sistem Informasi Manajemen Arsip dapat membantu para pengguna dalam mengelola arsip yang banyak serta penggunaan <em>AJAX</em> berpengaruh terhadap kecepatan akses web.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Judul2"><em>Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. Web Push Notification is a notification mechanism using Javascript in a web browser. This feature is available in the HTML5 Push API by using a Push Service or Messaging server that sends notifications to subscribed web browsers without opening the website so that it can broadcast and the HTML5 Notification API does not require a Push Service or Messaging server but must open a website, but not supported all web browsers so that this paper discusses Push Notification Web Implementation in archive management information systems using PushJS, the development method used is the Rational Unified Process (RUP). Notification technology that is suitable for web-based archive management information systems namely HTML5 Notification API because it will not send the same notification to all users. But there is no process behind the scenes so that it will not be run automatically, the problem is overcome by using AJAX by retrieving JSON and then running repeatedly on the web browser and minimizing clashes between web push notification scripts on multi tab windows or web browser windows resolved using localStorage from the HTML5 WebStorage API. The test results show that the application of Web Push Notification technology in the Archive Management Information System can help users manage many archives and use AJAX influences the speed of web access.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
Style APA, Harvard, Vancouver, ISO itp.
43

Vatsal, Prince. "Real-Time Human Pose Estimation Using Machine Learning". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 05 (21.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem34377.

Pełny tekst źródła
Streszczenie:
Human pose estimation is a pivotal domain within computer vision, underpinning applications from motion capture in cinematic production to sophisticated user interfaces in desktop devices. This research delineates the implementation of real-time human pose estimation within web browsers utilizing TensorFlow.js and the PoseNet model. PoseNet, an advanced machine learning model optimized for browser-based execution, facilitates precise pose detection sans specialized hardware. The primary aim of this study is to integrate PoseNet with TensorFlow.js, achieving efficient real-time pose estimation directly in the browser by leveraging JavaScript, thereby ensuring seamless user interaction and broad accessibility. A modular system architecture is designed, focusing on optimization strategies such as model quantization, asynchronous processing, and on-device computation to enhance performance and privacy preservation. In conclusion, this research establishes a robust framework for deploying PoseNet in web environments, underscoring its potential to revolutionize human-computer interaction within browser-based applications. Our findings contribute significantly to the field of computer vision and machine learning, offering insights into the practical deployment of pose estimation models on widely accessible platforms. Keywords — ReaReal-time Pose Estimation, TensorFlow.js, PoseNet, Machine Learning, Computer Vision, Browser-based Pose Detection, Human-Computer Interaction, Multi-person Tracking, On-device Computation, Asynchronous Processing, Cross-browser Compatibility, Performance Optimization, Privacy-preserving AI, Web-based Machine Learning, Motion Capture, Fitness Tracking, Interactive , Virtual Reality Interfaces, Deep LearningLearning
Style APA, Harvard, Vancouver, ISO itp.
44

Goode, Robert J. A., Simon Yu, Anitha Kannan, Jeffrey H. Christiansen, Anthony Beitz, William S. Hancock, Edouard Nice i A. Ian Smith. "The Proteome Browser Web Portal". Journal of Proteome Research 12, nr 1 (5.12.2012): 172–78. http://dx.doi.org/10.1021/pr3010056.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Ferdman, Sela, Einat Minkov, Ron Bekkerman i David Gefen. "Quantifying the web browser ecosystem". PLOS ONE 12, nr 6 (23.06.2017): e0179281. http://dx.doi.org/10.1371/journal.pone.0179281.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Brown, Marc H., i Robert A. Shillner. "DeckScape: an experimental Web browser". Computer Networks and ISDN Systems 27, nr 6 (kwiecień 1995): 1097–104. http://dx.doi.org/10.1016/0169-7552(95)00036-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Shah, Ramya, Parag Shukla, Dr Digvijaysinh Rathod, Hitesh Sanghvi i Yashrajsinh Zala. "Web Browser Forensics: Mozilla Firefox". International Journal of Electronic Security and Digital Forensics 1, nr 1 (2024): 1. http://dx.doi.org/10.1504/ijesdf.2024.10055704.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Roberts, Caroline, Jessica M. E. Herzing, Marc Asensio Manjon, Philip Abbet i Daniel Gatica-Perez. "Response Burden and Dropout in a Probability-Based Online Panel Study – A Comparison between an App and Browser-Based Design". Journal of Official Statistics 38, nr 4 (1.12.2022): 987–1017. http://dx.doi.org/10.2478/jos-2022-0043.

Pełny tekst źródła
Streszczenie:
Abstract Survey respondents can complete web surveys using different Internet-enabled devices (PCs versus mobile phones and tablets) and using different software (web browser versus a mobile software application, “app”). Previous research has found that completing questionnaires via a browser on mobile devices can lead to higher breakoff rates and reduced measurement quality compared to using PCs, especially where questionnaires have not been adapted for mobile administration. A key explanation is that using a mobile browser is more burdensome and less enjoyable for respondents. There are reasons to assume apps should perform better than browsers, but so far, there have been few attempts to assess this empirically. In this study, we investigate variation in experienced burden across device and software in wave 1 of a three-wave panel study, comparing an app with a browser-based survey, in which sample members were encouraged to use a mobile device. We also assess device/software effects on participation at wave 2. We find that compared to mobile browser respondents, app respondents were less likely to drop out of the study after the first wave and the effect of the device used was mediated by subjective burden experienced during wave 1.
Style APA, Harvard, Vancouver, ISO itp.
49

Sunitharam, Dr C., Sayimpu Vinay i Sannapaneni Anand. "Preserving Privacy and Security in Browser Case Study of Mantis Browser". International Journal of Soft Computing and Engineering 12, nr 1 (30.03.2022): 1–4. http://dx.doi.org/10.35940/ijsce.a3544.0312122.

Pełny tekst źródła
Streszczenie:
Abstract: The internet was meant to shorten the distance between the people to ground breaking level. It is essential tool for everyday task. But with this, internet service providers are allowed to share and sell their customers web browsing data without their concedence. sometimes, sold data makes security weakened and makes unprecedented way to spammers. With third party trackers, privacy gone under more risk factor, which makes no deterrent for Cyberattacks, terrorism and other phenomena. In today’s hig h tech environment organizations, Government and individual user has to use web browsers and internet for accessing web data. nowadays some Advertisers trying to mislead users. So, we propose a new way of browsing anonymously, untraceable web surfing and s trong firewall using new browser. There will be no bookmarks, Advertisements and no selling of data to marketers.
Style APA, Harvard, Vancouver, ISO itp.
50

Shoikhedbrod, Michael. "Using JavaScript in web design". BOHR International Journal of Engineering 2, nr 1 (2023): 7–14. http://dx.doi.org/10.54646/bije.2023.12.

Pełny tekst źródła
Streszczenie:
JavaScript was created to bring a web page to life. Scripts are programs written in JavaScript. Each script is connected directly to HyperText Markup Language (HTML) in any browser and is immediately executed when the web page is loaded. JavaScript scripts are written in plain text that does not require special training, which is why JavaScript is very different from the Java programming language, to which it is very similar. A special interpreter program allows JavaScript to be used not only in the browser but anywhere, and therefore the process of executing script commands is called “interpretation.” The interpreter executes the program’s JavaScript ource code (script) “as is” in browsers. Modern interpreters convert JavaScript to machine code before execution, optimize it, and only then perform it. Because of this, JavaScript is very fast. All known browsers have a JavaScript interpreter built into them, which is why they can execute scripts on the page. However, JavaScript can be used outside of the browser. This is a full-fledged language, with programs that can be run on a server and even on consumer electronic devices, if they have the appropriate interpreter installed. This article presents various JavaScript applications, used by the author, embedded in HTML files that allow a web designer to make a text animation presentation on a web page, to make a slide show, to create a questionnaire with ready-made answers so that the user reading the web page can easily master the necessary material contained in the questionnaire, to conduct an exam with the user on any topic of interest to him or her in a multitask mode with assessments of the exam results and a table of correct answers, place scientific applications on the web page, for example, a table of chemical elements by Mendeleev with printing of all parameters of a chemical element at the request of the user or calculators that the user can use online. The author has managed to build HTML using JavaScript that allows displaying beautiful Java applets accompanied by a banner, designed as a Java applet, contained within a moving window that expands from the left end and moves to the right end at the top of the web page.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii