Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
2421
Evaluation of Breakthrough Technological Innovation Capability of Petroleum Equipment Manufacturing Enterprises Based on the CFPR-TIFNs Model
Published 2022-01-01“…“Internet + innovation” is a new emerging paradigm for breakthrough technological innovation, which is more complex than traditional scenarios because “Internet +” has completely overturned the acquisition of creativity and knowledge. …”
Get full text
Article -
2422
INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN
Published 2017-10-01“…The article is devoted to the problem of interaction between schoolchildren and possible informational risks transmitted on the Internet. Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. …”
Get full text
Article -
2423
Konsep Pendidikan Good Netizen Melalui Kurikulum Tersembunyi
Published 2018-05-01“…This paper examines the education of good netizens through a hidden curriculum. The tendency of internet citizens who prefer to spread insults, hatred and even slander, is a problem for the school. …”
Get full text
Article -
2424
Research on multi-source application level multicast for awareness driven virtual space teleconferencing
Published 2007-01-01“…Virtual space teleconferencing is a novel CSCW tool that has abroad application perspective.There is no effi-cient communication mechanism to realize virtual space teleconferencing on Internet because most of end hosts in today’s Internet have limited access bandwidth and the Internet does not support IP multicast.Adopting mesh-first and centralized strategies,a multi-source application level multicast method ESMVST for awareness driven virtual space teleconferenc-ing on Internet was devised.The research focused on ESMVST method’s application level multicast routing model VSTMMR and proposed a heuristic routing algorithm MDMM.The result of experiment shows that MDMM algorithm could reduce both algorithm’s rejection rate and data distribution trees’ maximal delay effectively,and ESMVST method is feasible.…”
Get full text
Article -
2425
API, Cloud computing, WebGIS and cartography
Published 2010-12-01“…This paper explores some of the digital mapping processes available on the Internet in order to analyse their cartographic congruence. …”
Get full text
Article -
2426
Interconnection and coexistence of heterogeneous network:requirements, challenges, and architecture
Published 2022-06-01“…With the rapid development of the network technology and applications, many networks with different types of topologies and services have been emerging, such as Internet, satellite Internet, industrial Internet, unmanned aerial vehicle swarm network, and vehicle Internet, forming a situation in which many differentiated network systems coexist, to this end, the requirements and challenges were elaborated for heterogeneous networks to be integrated and coexist.Then CoLoR, an architecture for securely and efficiently interconnect heterogeneous networks was introduced.Based on the consistent function (i.e., information transmission) among heterogeneous network systems, CoLoR introduces multi-dimensional namespace for the universal representation.Moreover, CoLoR decouples the intra-domain routing and the inter-domain routing to ensure the evolution ability.Finally, CoLoR also constructs an efficient cross-domain communication mode and a security guarantee mechanism.…”
Get full text
Article -
2427
An Adaptive Clustering Scheme for Improving the Scalability in Intelligent Transportation Systems
Published 2013-12-01“…In this context, gateway is the portal of accessing the Internet. The efficiency of gateway management in ITSs thus profoundly affects the applicability of Internet-enabled applications. …”
Get full text
Article -
2428
Чемпионат Европы по футболу 2012 глазами польских и русских интернетчиков
Published 2016-02-01“…The author presents the response of Internet users to the incidents that occurred during Euro 2012. …”
Get full text
Article -
2429
Access mechanism of TMP under mobile network
Published 2010-01-01“…The publication of TCG MTM standard ensured the safety of mobile terminal and its promotion results in the changes of communication on mobile terminals.An access mechanism to trusted mobile platform(mobile terminals with MTM chips,TMP) was proposed on mobile Internet.This mechanism defined an extended service set as a service field,introduced TMP and Internet ISP of strategy decider management field,and defined two visit mode of TMP on mobile Internet,self field service and cross field visit.The progress of each mode was described in details.Cross field visit mode was defined as roaming service and resource request.The trusted evaluation system of TMP access mechanism was specifically described.Universal combinational safe mode was used to analyze the safety of the two TMP access.The analysis shows that this mechanism brings about trusted TMP access on mobile Internet and is safe,practical and high efficient.…”
Get full text
Article -
2430
Numerical approach to compound quantum repeater scheme with coherent states
Published 2024-02-01Get full text
Article -
2431
Brand promotion through online advertising: current tools
Published 2024-04-01“…In the conducted research, the authors describe the features of brand promotion using Internet marketing tools. The key types of online advertising and their differences are given alongside with the data on the Internet advertising market and its specifics. …”
Get full text
Article -
2432
-
2433
Investigating behavioural addictions in adults with and without attention deficit hyperactivity disorder.
Published 2025-01-01“…Those declaring a diagnosis of ADHD reported greater internet use problems and greater withdrawal from exercise. …”
Get full text
Article -
2434
Relying on the Information
Published 2013-11-01“…The editorial discusses internet filtering in the light of the optional internet packages for users, namely Family, Standard, Kids and Domestic, to be offered by the Information Technologies Board with the "Secure Internet Law" to take effect on August 22, 2011. …”
Get full text
Article -
2435
Adaptive decentralized AI scheme for signal recognition of distributed sensor systems
Published 2024-12-01Get full text
Article -
2436
Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia)
Published 2020-02-01“… Perkembangan jaringan komputer dan internet yang begitu pesat pada sekarang khususnya internet sebagai media informasi tentunya harus memiliki kualitas koneksi yang baik. …”
Get full text
Article -
2437
CAD Design for Recycling and Utilization of Waste Packaging from the Perspective of Ecological Criticism
Published 2022-01-01“…This paper takes logistics companies as the research object, aiming at the business model of logistics companies, uses the Internet of things recycling machine for packaging recycling, and establishes a dual channel packaging recycling model. …”
Get full text
Article -
2438
An Autonomous Planning Model for Deploying IoT Services In Fog Computing
Published 2024-02-01“…Fog computing can provide the resources needed by Internet of Things devices in a distributed manner at the edge of the network without involving the cloud. …”
Get full text
Article -
2439
Impact of facial tattoos and paintings on face recognition systems
Published 2021-11-01Get full text
Article -
2440
IoT-Based Real-Time Crop Drying and Storage Monitoring System
Published 2023-01-01Get full text
Article