Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
2461
YENİ İLETİŞİM TEKNOLOJİLERİNİN REKLAM ÜZERİNE ETKİLERİ
Published 2013-11-01“…Yeni iletişim teknolojileri de multimedya, etkileşimli TV ve internet gibi yeni medyaları yaratmıştır. 1990'ların başından itibaren internet, bilgisayar ve çoklu ortam uygulamalarını içeren bir tanımda kullanılan yeni medyalar kendini kanıtlama mücadelesine girmiştir. …”
Get full text
Article -
2462
Entertainment Architecture: Constructing a framework for the creation of an emerging transmedia form
Published 2012-07-01“…Entarch is classified as Internet-native transmedia entertainment — it fully utilises the unique communicative characteristics of the Internet and is not based on just one medium. …”
Get full text
Article -
2463
Some critical issues of content sharing network
Published 2016-10-01“…As a sharing platform for files,information and resources,CSN (content sharing network) possessed a very wide distribution in Internet.It did provide a great convenience for people to share various contents through Internet with the rapid development and wide application of network techniques,especially the emergence and prevalence of P2P (peer-to-peer).However,numerous malicious files,cheating information and spywares swarmed into Internet,which pose a serious threat to the security of CSN.A survey was made of some critical issues of CSN combining with the current development and research status from the perspective of network security.The critical issues include the definition and important properties,different taxonomies of types,key techniques,developing and researching trends of CSN.…”
Get full text
Article -
2464
Development trends of the information technology and cyberspace security
Published 2015-12-01“…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
Get full text
Article -
2465
Die impak van gepreokkupeerdheid met seksuele aktiwiteit geassosieer met internetgebruik op die gesin - 'n pastorale perspektief
Published 2006-12-01“… Together with the tremendous growth in the number of users of the internet in recent years, there was a corresponding growth in pornographic websites as well as internet sex. …”
Get full text
Article -
2466
Detection of malicious domain name based on a classifier combination
Published 2020-05-01“…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
Get full text
Article -
2467
Research on the full-dimensional defined polymorphic smart network
Published 2019-08-01“…For current Internet is confronted with some defects such as rigid structure,single IP bearing,and disability in suppressing unknown threats,the functions,performance,efficiency and security of the Internet were promoted from the perspective of network structure,the “structure definition” was introduced through all levels of the Internet,and a network architecture of multi-modal presentation of network functions was provided in all levels:full-dimensional defined polymorphic smart network (PINet),which supported full-dimensional definition and multi-modal presentation of addressing and routing,switching mode,interconnection mode,network element,transmission protocol,service properties and so on.Then the vision and goal,architecture and model,as well as the key technologies of PINet were discussed.The proposed architecture can provide a possible solution to the development of new network technologies.…”
Get full text
Article -
2468
The Effect of Social Media on Morality Among Youth in Kirigime Ward, Kabale Municipality, Kabale District.
Published 2023“…Social networking sites have become a very important aspect in young people's life. Internet use has grown considerably in the last decade and the majority of young adult uses the internet. …”
Get full text
Thesis -
2469
دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة
Published 2020-04-01“…The study Aimed to Identify in a Relation Ship big data analytics in IOTapplications benefits big data in internet of things , and Show the most popularplatforms to big data and IOT such as : Kaa , Hadoop , MAPR , and study therequirements of big data analytics in IOT finally show challenges facing big datain IOT the study was approved on the comparative method and reached severalresults the most important of them , the main problems that you face big data inIOT security and privacy 97%The most important results of the study : Big data and the Internet of things are complementary to each other, andthis integration is achieved through data analysis platforms. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
Get full text
Article -
2470
Performance evaluation of lightweight and secure protocol for wireless sensor networks: A protocol to enable Web services in IPv6 over low-power wireless personal area networks
Published 2017-06-01“…The integration of wireless sensor networks within the Internet has been possible with the use of the IPv6 over low-power wireless personal area network standard at lower layers and Web services at higher layers. …”
Get full text
Article -
2471
ÇOCUKLARIN ONLINE YASA DIŞI AKTİVİTELERİNİN ÖNLENMESİ
Published 2024-07-01“…Günlük yaşamımızda internet kullanımı son derece yaygınlaşmış olup artık her yaştan kişi interneti rahatça kullanabilmektedir. …”
Get full text
Article -
2472
Evolution of the Web: from Web 1.0 to 4.0
Published 2021-06-01“… The internet has become a vital component of the twenty-first century as technology has advanced. …”
Get full text
Article -
2473
HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks
Published 2024-12-01“…In recent years, the Internet has become part of the requirements of human life. …”
Get full text
Article -
2474
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. …”
Get full text
Article -
2475
Secret sharing-based authentication and key agreement protocol for machine-type communications
Published 2019-04-01“…One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of the main foundations for the continued growth of Internet of Things connectivity and an important issue to be treated in the development of 5G networks. …”
Get full text
Article -
2476
Fault-Tolerant Control Strategy for Neutral-Point-Clamped Three-Level Inverter
Published 2018-01-01Get full text
Article -
2477
Hubungan Loneliness dengan Perilaku Cybersex pada Emerging Adult
Published 2021-06-01“…Sebagai upaya mengatasi permasalahan tersebut, emerging adult memanfaatkan internet untuk menjalin relasi dengan individu lain agar tidak merasa kesepian. tetapi, tidak semua yang ada pada internet bersifat positif, dengan adanya internet akses pornografi semakin mudah, sehingga terjadi peningkatan terhadap perilaku cybersex. penelitian ini bertujuan untuk mengetahui hubungan loneliness dengan perilaku cybersex pada emerging adult. …”
Get full text
Article -
2478
Access to mass media and teenage pregnancy among adolescents in Zambia: a national cross-sectional survey
Published 2022-06-01“…Adolescents who had exposure to internet, newspapers or magazines, radio and television were 10.5%, 22.6%, 43.1% and 43.1%, respectively. …”
Get full text
Article -
2479
RenalSegNet: automated segmentation of renal tumor, veins, and arteries in contrast-enhanced CT scans
Published 2025-01-01Get full text
Article -
2480
An Improved Robust Principal Component Analysis Model for Anomalies Detection of Subway Passenger Flow
Published 2018-01-01Get full text
Article