-
81
The Influence of Prosocial and Antisocial Emotions on the Spread of Weibo Posts: A Study of the COVID-19 Pandemic
Published 2021-01-01“…Overall, a major contribution of this paper is our focus on prosocial and antisocial emotions in cyberspace, providing a new perspective on emotion communication.…”
Get full text
Article -
82
Review Of The Application Of Artificial Intelligence (AI) Exercise Training In Improving Cognitive Function In The Elderly Population
Published 2025-02-01“…The results show that AI training has been used in multiple fields, breaking through many limitations of traditional action recognition technology. Through virtual cyberspace, real-time interaction of multiple senses can be achieved, allowing people to feel reality in the virtual network and accurately capture participants' actions; Through AI games, elderly people can improve their physical and cognitive functions, reduce depression and anxiety, meet the psychological and social needs of dementia patients, enhance their independence and dignity in life, and make objective assessments of cognitive function, which may help prevent dementia. …”
Get full text
Article -
83
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
Get full text
Article -
84
A Lingual Agnostic Information Retrieval System
Published 2024-01-01“…The exclusion of monolingual natives from cyberspace is a global socioeconomic and cultural problem. …”
Get full text
Article -
85
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01Get full text
Article -
86
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01“…International cooperation is necessary to limit the development of AI cyber weapons, develop robust systems, and establish guidelines for responsible state activity in cyberspace. Through cooperation and foresight, the potential of AI is more likely to be achieved while reducing the likelihood of intensified cyber warfare. …”
Get full text
Article -
87
THE POLITICS OF HALAL LABEL: BETWEEN ECONOMIC PIETY AND RELIGIOUS AMBIGUITY
Published 2020-06-01“…Knowledge source no longer lies on Kiai/Ustadz only, but also on search engines available in cyberspace. Social media and the internet also become media used by the millennial Muslim generation to search for information on the product' rightfulness. …”
Get full text
Article -
88
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01Get full text
Article -
89
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
Published 2025-01-01Get full text
Article -
90
Machine Learning-Based Network Detection Research for SDNs
Published 2025-01-01Get full text
Article -
91
Investigating the Effects of Optimal Use of Public Transport to Reduce Traffic and Air Pollution in Tabriz
Published 2023-03-01“…Therefore, this dilemma has been one of the major challenges facing urban planning in the late twentieth century which has influenced the achievement of sustainable urban development goals. Electronics in cyberspace are an integral part of life. Today, the use of public transport is one of the issues that are related to different aspects of quality of life. …”
Get full text
Article -
92
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01“…Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021. …”
Get full text
Article -
93
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
Published 2021-01-01Get full text
Article -
94
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01Get full text
Article -
95
-
96
Ethical Considerations of Influencing Behavior Using Computer Technology
Published 2025-01-01“…Introduction: Computer technology and cyberspace have become an inseparable part of human life today and have affected all aspects of individual and social life. …”
Get full text
Article -
97
A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning
Published 2017-01-01Get full text
Article -
98
Complexities in Financial Network Topological Dynamics: Modeling of Emerging and Developed Stock Markets
Published 2018-01-01Get full text
Article -
99
Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024)
Published 2025-01-01“…Framed through the lens of neo-imperialism, the research evaluates India’s intelligence and cyberspace operations, which have employed persuasive techniques to influence Pakistan’s decision-making, including its nuclear program, during critical incidents. …”
Get full text
Article -
100
Dataset of digital literacy of university students in Indonesia
Published 2025-02-01“…These skills are essential for university students to interact appropriately in cyberspace. This dataset aims to provide a comprehensive overview of digital literacy skills among university students in Indonesia. …”
Get full text
Article