Academia.eduAcademia.edu

Internet technology

description3,077 papers
group1,820 followers
lightbulbAbout this topic
Internet technology encompasses the hardware, software, protocols, and systems that enable the creation, transmission, and management of data over the internet. It includes networking infrastructure, web development, cybersecurity, and communication protocols, facilitating global connectivity and information exchange.
lightbulbAbout this topic
Internet technology encompasses the hardware, software, protocols, and systems that enable the creation, transmission, and management of data over the internet. It includes networking infrastructure, web development, cybersecurity, and communication protocols, facilitating global connectivity and information exchange.

Key research themes

1. How has the evolution and architectural convergence of the Internet influenced its current role as a disruptive General Purpose Technology (GPT)?

This research theme examines the historical development, architectural shifts, and socio-technical factors shaping the Internet’s transformation from a Cold War military experiment into a widely pervasive General Purpose Technology (GPT). It investigates how changes in network architecture, stakeholder dynamics, and vertical integration trends have catalyzed the Internet’s disruptive impact on industries, economies, and social structures, highlighting the interplay between technical design decisions and broader political, economic, and ideological forces.

Key finding: By tracing the Internet’s origins from ARPANET to a mature, globally adopted network, the work elucidates that the Internet’s architecture, notably the TCP/IP protocol suite, was shaped not solely by technical factors but... Read more
Key finding: Through an empirical case study of Norwegian Autonomous Systems (AS) numbers, the paper demonstrates an emergent vertical integration and modular specialization within the Internet architecture. It details how content... Read more
Key finding: This work synthesizes advancements toward next-generation Internet architectures motivated by rising traffic complexities and emerging application demands such as augmented reality and machine-to-machine communication. It... Read more

2. What optimization and orchestration methodologies improve performance and scalability in distributed Internet-based systems and networks?

This theme focuses on advanced algorithmic and architectural approaches to enhance the efficiency, scalability, and reliability of distributed Internet-dependent systems. It captures research describing novel optimization algorithms inspired by natural phenomena and container orchestration tools aimed at dynamic resource allocation and workload balancing in multi-node environments, reflecting the ongoing efforts to address performance limitations in distributed web and networked infrastructures.

Key finding: The paper demonstrates that employing Docker Swarm for container orchestration across multiple nodes significantly improves distributed web application performance through optimized resource management, automatic load... Read more
Key finding: The paper proposes an enhanced Cat Swarm Optimization algorithm incorporating parallel seeking and tracing modes with communication between subgroups to improve localization accuracy and convergence speed in wireless sensor... Read more
Key finding: This study introduces a parallelized Multi-group Flower Pollination Algorithm (MFPA) employing novel communication strategies among subpopulations to enhance convergence rates and search accuracy for global optimization... Read more

3. What factors influence Internet adoption and utilization in different socio-economic contexts, and how do infrastructure and ethical considerations shape Internet technology's role in education and healthcare?

This theme explores socio-technical aspects governing Internet diffusion and use, especially in developing regions, alongside the integration of Internet-based technologies in educational and healthcare contexts. It emphasizes infrastructure availability, cost, policy, and ethical frameworks influencing digital inclusion, and examines how Internet resources facilitate instructional effectiveness and novel medical applications, highlighting the ethical responsibilities of organizations deploying Internet technology for social benefit.

Key finding: Statistical analysis across selected African countries reveals that Internet adoption rates are strongly correlated with economic strength, telecommunication infrastructure investment, and Internet host densities. High access... Read more
Key finding: This paper argues that rapid technological adoption, particularly concerning AI, smart devices, and Internet-dependent systems, necessitates proactive ethical frameworks within organizations. It highlights the critical role... Read more
Key finding: The paper proposes a specification-based misbehavior detection system for Artificial Pancreas Systems that monitors embedded device behaviors to detect security anomalies exploiting Internet-connected implantable medical... Read more
Key finding: The study designs an Internet-enabled auxiliary diagnostic system for Parkinson’s Disease leveraging wearable accelerometer devices transmitting gait data to mobile and server platforms. Utilizing a 1D convolutional neural... Read more

All papers in Internet technology

Computer aided digital patching of the fragmented object has the great advantages in efficiency, re-operation and avoiding of inadvertent damage, which is widely used in restoring and repairing of culture heritages. In this paper, we... more
The advancement of internet technologies has been significantly observed in past decades and is proved most utilitarian in educational sector. Interaction with digitally delivered content, network-based services and tutoring support are... more
Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. Cuprins: EDITORIALS / EDITORIALE Provocări și limitări în utilizarea inteligenței artificiale... more
The paper describes the architecture of a distributed web-based measurement system able to disseminate measurement data over the Internet. After drawing the general architecture here proposed, the paper goes on describing, in somewhat... more
Legacy information systems typically form the backbone of the information flow within an organisation and are the main vehicle for consolidating information about the business. As a solution to the problems these systems posebrittleness,... more
The Internet of Things (IoT) applies the sensors and microcontrollers and links them through the internet. The eventual objective of low-power devices for Internet of Things is to lesser the overall system power and to extend battery... more
Middleware is a layer of software that is used by applications to locate people and resources and to provide security. Middleware in the form of authentication, authorization, and directory services is especially of interest for improving... more
Virtual Private Server (VPS) enables user access to an operating system instance with a fine-grained control of private software and hardware resources. Many various factors can affect VPS performance and they primarily include physical... more
Collaborative business services represent the collaboration of business service domains across organisations. This collaboration is characterised by the interdependencies of business activities and business resources between business... more
We introduce a statistical experiment setting to carry out a multicollision attack on any iterated hash function. We develop a method for finding multicollisions that gives larger multicollision sets for the same amount of work as Joux's... more
The design principles proposed independently by both Ralph Merkle and Ivan Damgård in 1989 are applied widely in hash functions that are used in practice. The construction reads the message in one message block at a time and applies... more
We introduce a statistical experiment setting to carry out a multicollision attack on any iterated hash function. We develop a method for finding multicollisions that gives larger multicollision sets for the same amount of work as Joux's... more
Reproduction is an open access, online, peer-review journal publishing papers on all aspects of research into reproductive endocrinology, infertility, bioethics and the advanced reproductive technologies. The journal reports on important... more
In addition to measurements of physical and mechanical properties, quality inspections also include metallographic analyses. When gray casting iron material, different manufacturing processes cause different microstructures in the... more
The Internet has provided a plethora of commercial opportunities, the majority of them arising from advances in software and networking. As the technology evolves in an ever increasing pace, new opportunities are bound to be created. This... more
Collaborative business services represent the collaboration of business service domains across organisations. This collaboration is characterised by the interdependencies of business activities and business resources between business... more
When the construction of a network component has finished the testing phase begins, which is just as important as the implementation itself. During testing the conformance test has to be executed first. The conformance test examines... more
When the construction of a network component has finished the testing phase begins, which is just as important as the implementation itself. During testing the conformance test has to be executed first. The conformance test examines... more
The various forms and tremendous number of spam emails have brought great challenges to accurate email classification. In this paper, we present a behavior- and time-feature-based email classification method. Based on email logs, email... more
Internet technology as a widely accepted modern telecommunication standard has been widely extended to combine with numerous other technologies, e.g., satellite, ATM, wireless. This is what we term as Hybrid Internet. Along with this... more
The opening up of the Internet to large-scale public access from the early 1990s was attended by a proliferation of words associated with, referring to, and circulating on the Internet. A great many dictionaries of such Internet terms... more
Using textual passwords suffer from the balance between security and usability. Password policies are usually adopted by system administrators to force users to choose strong passwords. However, users often use a simple password to make... more
The Virtual Reali? Modelling Language [I], V M has become a recognised standard for network applied and network distributed virtuaf reafi? during rhe past three years. In this article, we shall describe and present current ideas in VRML... more
This paper considers the support of real-time applications in an Integrated Services Packet Network (ISPN). We first review the characteristics of real-time applications. We observe that, contrary to the popular view that real-time... more
bVhen building small product families, sofivare should be shared between drfferent members of the family, birt the sofiare can still be created as one system (Ivith variation points) with a single architecture. For large and diverse... more
This paper describes Pavilion, an object-oriented middleware framework for developing collaborative webbased applications. Pavilion enables a developer to construct new applications by inheriting and extending its default functionality.... more
This paper shows that online political discussion networks are, on average, wider and deeper than the networks generated by other types of discussions: they engage a larger number of participants and cascade through more levels of nested... more
The Information and Communications Technologies are making possible a new form to teach and to learn in a global context that cannot be ignored by the Universities. Their educative policies in the Information and Knowledge Society have to... more
Data sharing over the internet is increasingly efficient and increasingly anonymous. This growing anonymity makes it difficult for data users to exchange feedback: interesting ideas, innovations, ancillary data, concerns about data... more
We present a simulation approach that provides a relatively risk-free and cost-effective environment to examine the decision space for both bid takers and bid makers in web-based dynamic price setting processes. The applicability of the... more
Creating 3D reconstruction of the past is a challenging task requiring a vast set of technical skills, with teams usually including historians, 3D artists and IT technicians. In this paper, we describe our combined efforts to work under a... more
Despite 30 years' experimentation and 20 years' availability of commercial products, the architecture, engineering, and construction industry in the mid-1990s had yet to achieve an effective integration of computer-based techniques into... more
Shortest path analysis is one of a significant tool in GIS. Several algorithms can be used to utilize the analysis. Dijkstra's algorithm has proven its capability in providing two-dimensional (2D) shortest route information. However,... more
several new applications and the new emerging technologies that make ad hoc networking possible are pushing the development of ad hoc networks. Securing the ad hoc environment is essential for the success of these new applications as well... more
Scholars from different disciplines have recently studied a phenomenon called "the digital divide". Since many of the new government information technology initiatives are based on Internet technologies and require the use of the Internet... more
The emergence of internet technology results in manifold opportunities of cost -effective one-to-one relationships with customers. It is intended to provide customer oriented information and products etc. in an individualized one-to-one... more
The world of business is being profoundly transformed by the Internet and electronic commerce. The rapid advancement of Internet technology and its applications holds promise for the expansion of business opportunities in the global... more
The emergence of information technology has resulted in an ever-increasing demand to use computers for the efficient management and dissemination of information. Keeping in view the strong need of farmers to collect important and updated... more
The aim of the present paper is to closely consider the notions of ''space'' and ''identity'' from two different perspectives of the human experience. We are most of all interested in the psychological realm to which we devote the major... more
An internet-based information and monitoring platform for the specific requirements of geotechnical engineering projects is presented. The platform is based on a hybrid-model approach consisting of a model-based information management... more
The exponential growth of resources on the web, and the wide deployment of devices for multimodal access to the Internet, lead to new problems in information management. In this context, and as part of the European project Vision, we have... more
This article is aimed at analyzing the motivations on the part of firms to invest in websites. What are the drivers behind such investments? In order to address this issue, we have considered two alternative theoretical frameworks. The... more
This paper presents a blind image authentication technique. It reports on several processes involved in image authentication, tamper detection, and tampered image recovery. The authentication codes of each block consist of three features,... more
Download research papers for free!