Showing 2,481 - 2,500 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 2481

    ÜNİVERSİTE ÖĞRENCİLERİNİN SOSYAL MEDYA KULLANIMLARI ÜZERİNE BİR ARAŞTIRMA: ANADOLU ÜNİVERSİTESİ ÖRNEĞİ by İrem Erdem Aydın

    Published 2016-02-01
    “…Öte yandan kullanıcıların internet kullanım sıklıklarının hergün beş-altı saat aralığında yoğunlaştığı görülmüş ve internet kullanım sıklıkları ile sosyal ağ araçlarının kullanımı arasında anlamlı bir ilişki bulunmuştur. …”
    Get full text
    Article
  2. 2482

    Exploring the vulnerability in the inference phase of advanced persistent threats by Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng

    Published 2022-03-01
    “…In recent years, the Internet of Things has been widely used in modern life. …”
    Get full text
    Article
  3. 2483

    Mobile ad-hoc networks: MANET by Mikarić Bratislav, Spalević Petar, Jakšić Branimir

    Published 2018-01-01
    “…This way of accessing the Internet while on the go-via a laptop computer would require an infrastructure like the GSM network. …”
    Get full text
    Article
  4. 2484

    Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches by Mahmood Al-Bahri, Wasin Alkishri, Falah Y. H. Ahmed, Marwan Alshar'e, Sanad Al Maskari

    Published 2024-03-01
    “… The Internet of Things (IoT) encompasses a network of different devices, both stationary and mobile, that may interact with the physical world. …”
    Get full text
    Article
  5. 2485

    Secure OpenID Authentication Model by Using Trusted Computing by E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah

    Published 2014-01-01
    “…The growth of Internet online services has been very quick in recent years. …”
    Get full text
    Article
  6. 2486
  7. 2487
  8. 2488

    Impact of digital exposure on premarital sex and contraception use among unmarried Indian youth by Pragati Dattatraya Ubale, Punit Mishra, Aditi, Rajib Acharya, T.V. Sekher

    Published 2025-01-01
    “…With the widespread use of mobile phones and the internet, attitudes and behaviors towards premarital sexual activities are inevitably shifting. …”
    Get full text
    Article
  9. 2489

    The Role of Public Libraries in Promoting Digital Literacy for Community Empowerment in Western Uganda. by Rwotolonya, Sarah Kakuru

    Published 2023
    “…To evidence this, in Uganda, 36% of the non-internet users are digitally illiterate, and the digital literacy index is still low at 20%. …”
    Get full text
    Article
  10. 2490

    Research and application of media streams based on entropy and FAHP by Qizhu ZHONG

    Published 2020-04-01
    “…Aiming at the problem of end-to-end user perception evaluation method for mobile internet media streams was still vacant,a method based on entropy and fuzzy hierarchy was proposed to evaluate media streams.Firstly,XDR data indicators were processed by box-line graph method.Then,entropy method and fuzzy hierarchy method were used to revise the evaluation.The whole network process of the whole video service was modified from multi-dimension to realize the perception evaluation of the use of mobile internet video users.At the same time,the end-to-end health evaluation of the network was also realized.The results of a series of simulation experiments show that the proposed method can improve the accuracy of media stream evaluation while avoiding one-sided evaluation of a single index.It provids a method and solution for the optimization of the overall internet quality and multi-dimensional network fault location.…”
    Get full text
    Article
  11. 2491

    Comparative study of anonymous network Tor and I2P by Yun YANG, Lingyan LI, Qingzheng WEI

    Published 2019-02-01
    “…Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.…”
    Get full text
    Article
  12. 2492

    Deep Neural Network Model Forecasting for Financial and Economic Market by Fan Chen

    Published 2022-01-01
    “…Recently, the Internet financial market has developed rapidly both at home and abroad. …”
    Get full text
    Article
  13. 2493

    Loosing no time to deploy digital economy and digital transformation to spur ICT innovation——The latest ICT development trend showcased in the science and technology award of CIC i... by China InstituteofCommunications(CIC)

    Published 2021-01-01
    “…ICT Innovation, industrial development and the new information infrastructure construction, represented by 5G, artificial intelligence, and integrated space-air-ground networks will play an important role in the implementation of the national strategy of building a powerful communications network and comprehensively building a modern socialist country.Based on the current technological development in the ICT field, the China Institute of Communications summarized and sorted out the key directions of technological innovation in this field, including a new generation of mobile communications, network enabling, quantum communications, satellite internet, smart network operation and maintenance, cyberspace security, and the internet of things and the internet of vehicles, network cost reduction and efficiency enhancement, and basic technologies, etc., providing references for all walks of life to understand the technological development in the ICT field.…”
    Get full text
    Article
  14. 2494

    Information seeking by blind and sight impaired citizens: an ecological study

    Published 2000-01-01
    “…The findings of the study address issues of information needs, information sources, the role of the Internet in meeting needs and the barriers to the use of the Internet. …”
    Get full text
    Article
  15. 2495

    Development,challenge and opportunity of optical fiber communication system technologies by Xiuguo CUI, Xiang LIU, Shiyi CAO, Min ZHOU

    Published 2016-05-01
    “…Optical fiber communication system is one of the core supporting systems of the modern internet age.Firstly,major recent technological advances in optical fiber communication system were summarized.Then,the driving forces for its future development in the emerging cloud era,the future challenges and opportunities that it faced were analyzed.With the consideration of these challenges and opportunities,the future evolution paths in key areas such as optical fiber communication system overall network architectures,core network technologies,metro network technologies,access network technologiesand novel software-defined optical transport network technologies in the upcoming cloud erawere described,aiming to support future generations of internet,data center interconnect,internet of things and 5G mobile network,as well as the smart home and smart city initiativesmore effectively.…”
    Get full text
    Article
  16. 2496

    Green IoT: how wireless sensor networks are paving the way for sustainable smart environments by Haifa Alqahtani

    Published 2023-06-01
    “…The Internet of Things (IoTs) enables the incorporation and connecting of physical devices to the internet with little human intervention and human-to-human or human-to-PC communication. …”
    Get full text
    Article
  17. 2497

    Research on fusion model based on deep learning for text content security enhancement by Shaomin WANG, Zheng WANG, Hua REN

    Published 2020-05-01
    “…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
    Get full text
    Article
  18. 2498

    Bilgiyi Süzmek by M. Tayfun Gülle

    Published 2011-09-01
    “…The article deals with the concerns about Secure Internet Law to be enforced on November 22, 2011, and points out that individuals of democratic societies are capable of filtering information and families have a part to play in protecting from the information pollution on the Internet. …”
    Get full text
    Article
  19. 2499

    Characterizing the role of vehicular cloud computing in road traffic management by Iftikhar Ahmad, Rafidah Md Noor, Ihsan Ali, Muhammad Imran, Athanasios Vasilakos

    Published 2017-05-01
    “…Potential future challenges and emerging technologies, such as the Internet of vehicles and its incorporation in traffic congestion control, are also discussed. …”
    Get full text
    Article
  20. 2500

    Echoing Mechanism of Juvenile Delinquency Prevention and Occupational Therapy Education Guidance Based on Artificial Intelligence by Fang Hou

    Published 2022-01-01
    “…The causes of juvenile delinquency in the Internet culture are discussed in terms of the Internet environment, juvenile use of the Internet, Internet supervision, and crime prevention education, respectively. …”
    Get full text
    Article