Showing 2,461 - 2,480 results of 5,694 for search '"internet"', query time: 0.06s Refine Results
  1. 2461

    YENİ İLETİŞİM TEKNOLOJİLERİNİN REKLAM ÜZERİNE ETKİLERİ by Vesile Çakır

    Published 2013-11-01
    “…Yeni iletişim teknolojileri de multimedya, etkileşimli TV ve internet gibi yeni medyaları yaratmıştır. 1990'ların başından itibaren internet, bilgisayar ve çoklu ortam uygulamalarını içeren bir tanımda kullanılan yeni medyalar kendini kanıtlama mücadelesine girmiştir. …”
    Get full text
    Article
  2. 2462

    Entertainment Architecture: Constructing a framework for the creation of an emerging transmedia form by Konzal Woitek

    Published 2012-07-01
    “…Entarch is classified as Internet-native transmedia entertainment — it fully utilises the unique communicative characteristics of the Internet and is not based on just one medium. …”
    Get full text
    Article
  3. 2463

    Some critical issues of content sharing network by Qiang LU, Bo LIU, Hua-ping HU

    Published 2016-10-01
    “…As a sharing platform for files,information and resources,CSN (content sharing network) possessed a very wide distribution in Internet.It did provide a great convenience for people to share various contents through Internet with the rapid development and wide application of network techniques,especially the emergence and prevalence of P2P (peer-to-peer).However,numerous malicious files,cheating information and spywares swarmed into Internet,which pose a serious threat to the security of CSN.A survey was made of some critical issues of CSN combining with the current development and research status from the perspective of network security.The critical issues include the definition and important properties,different taxonomies of types,key techniques,developing and researching trends of CSN.…”
    Get full text
    Article
  4. 2464

    Development trends of the information technology and cyberspace security by Feng-hua LI

    Published 2015-12-01
    “…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
    Get full text
    Article
  5. 2465

    Die impak van gepreokkupeerdheid met seksuele aktiwiteit geassosieer met internetgebruik op die gesin - 'n pastorale perspektief by W. Coetzer

    Published 2006-12-01
    “… Together with the tremendous growth in the number of users of the internet in recent years, there was a corresponding growth in pornographic websites as well as internet sex. …”
    Get full text
    Article
  6. 2466

    Detection of malicious domain name based on a classifier combination by Jiantao SHENG, Maofei CHEN, Dongxin LIU, Laifu WANG, Guoshui SHI, Huamin JIN

    Published 2020-05-01
    “…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
    Get full text
    Article
  7. 2467

    Research on the full-dimensional defined polymorphic smart network by Yuxiang HU, Peng YI, Penghao SUN, Jiangxing WU

    Published 2019-08-01
    “…For current Internet is confronted with some defects such as rigid structure,single IP bearing,and disability in suppressing unknown threats,the functions,performance,efficiency and security of the Internet were promoted from the perspective of network structure,the “structure definition” was introduced through all levels of the Internet,and a network architecture of multi-modal presentation of network functions was provided in all levels:full-dimensional defined polymorphic smart network (PINet),which supported full-dimensional definition and multi-modal presentation of addressing and routing,switching mode,interconnection mode,network element,transmission protocol,service properties and so on.Then the vision and goal,architecture and model,as well as the key technologies of PINet were discussed.The proposed architecture can provide a possible solution to the development of new network technologies.…”
    Get full text
    Article
  8. 2468

    The Effect of Social Media on Morality Among Youth in Kirigime Ward, Kabale Municipality, Kabale District. by Zakia, Lucky

    Published 2023
    “…Social networking sites have become a very important aspect in young people's life. Internet use has grown considerably in the last decade and the majority of young adult uses the internet. …”
    Get full text
    Thesis
  9. 2469

    دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة by د. یارة ماهر قناوى

    Published 2020-04-01
    “…The study Aimed to Identify in a Relation Ship big data analytics in IOTapplications benefits big data in internet of things , and Show the most popularplatforms to big data and IOT such as : Kaa , Hadoop , MAPR , and study therequirements of big data analytics in IOT finally show challenges facing big datain IOT the study was approved on the comparative method and reached severalresults the most important of them , the main problems that you face big data inIOT security and privacy 97%The most important results of the study : Big data and the Internet of things are complementary to each other, andthis integration is achieved through data analysis platforms. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
    Get full text
    Article
  10. 2470

    Performance evaluation of lightweight and secure protocol for wireless sensor networks: A protocol to enable Web services in IPv6 over low-power wireless personal area networks by Patricia E Figueroa, Jesús A Pérez, Ismael Amezcua

    Published 2017-06-01
    “…The integration of wireless sensor networks within the Internet has been possible with the use of the IPv6 over low-power wireless personal area network standard at lower layers and Web services at higher layers. …”
    Get full text
    Article
  11. 2471

    ÇOCUKLARIN ONLINE YASA DIŞI AKTİVİTELERİNİN ÖNLENMESİ by Rabia Pelin Opan Gündal

    Published 2024-07-01
    “…Günlük yaşamımızda internet kullanımı son derece yaygınlaşmış olup artık her yaştan kişi interneti rahatça kullanabilmektedir. …”
    Get full text
    Article
  12. 2472

    Evolution of the Web: from Web 1.0 to 4.0 by Asaad Khaleel Ibrahim

    Published 2021-06-01
    “… The internet has become a vital component of the twenty-first century as technology has advanced. …”
    Get full text
    Article
  13. 2473

    HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks by Elham Asadi, Soodeh Hosseini

    Published 2024-12-01
    “…In recent years, the Internet has become part of the requirements of human life. …”
    Get full text
    Article
  14. 2474

    Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version by M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan

    Published 2015-01-01
    “…The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. …”
    Get full text
    Article
  15. 2475

    Secret sharing-based authentication and key agreement protocol for machine-type communications by Ana Paula G Lopes, Lucas O Hilgert, Paulo RL Gondim, Jaime Lloret

    Published 2019-04-01
    “…One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of the main foundations for the continued growth of Internet of Things connectivity and an important issue to be treated in the development of 5G networks. …”
    Get full text
    Article
  16. 2476
  17. 2477

    Hubungan Loneliness dengan Perilaku Cybersex pada Emerging Adult by Laily Aura Nisya Habibi, Afif Kurniawan

    Published 2021-06-01
    “…Sebagai upaya mengatasi permasalahan tersebut, emerging adult memanfaatkan internet untuk menjalin relasi dengan individu lain agar tidak merasa kesepian. tetapi, tidak semua yang ada pada internet bersifat positif, dengan adanya internet akses pornografi semakin mudah, sehingga terjadi peningkatan terhadap perilaku cybersex. penelitian ini bertujuan untuk mengetahui hubungan loneliness dengan perilaku cybersex pada emerging adult. …”
    Get full text
    Article
  18. 2478

    Access to mass media and teenage pregnancy among adolescents in Zambia: a national cross-sectional survey by David Mukunya, Daniel Mwamba, Quraish Sserwanja, Abigail Sitsope Sepenu

    Published 2022-06-01
    “…Adolescents who had exposure to internet, newspapers or magazines, radio and television were 10.5%, 22.6%, 43.1% and 43.1%, respectively. …”
    Get full text
    Article
  19. 2479
  20. 2480