Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
2481
ÜNİVERSİTE ÖĞRENCİLERİNİN SOSYAL MEDYA KULLANIMLARI ÜZERİNE BİR ARAŞTIRMA: ANADOLU ÜNİVERSİTESİ ÖRNEĞİ
Published 2016-02-01“…Öte yandan kullanıcıların internet kullanım sıklıklarının hergün beş-altı saat aralığında yoğunlaştığı görülmüş ve internet kullanım sıklıkları ile sosyal ağ araçlarının kullanımı arasında anlamlı bir ilişki bulunmuştur. …”
Get full text
Article -
2482
Exploring the vulnerability in the inference phase of advanced persistent threats
Published 2022-03-01“…In recent years, the Internet of Things has been widely used in modern life. …”
Get full text
Article -
2483
Mobile ad-hoc networks: MANET
Published 2018-01-01“…This way of accessing the Internet while on the go-via a laptop computer would require an infrastructure like the GSM network. …”
Get full text
Article -
2484
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01“… The Internet of Things (IoT) encompasses a network of different devices, both stationary and mobile, that may interact with the physical world. …”
Get full text
Article -
2485
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…The growth of Internet online services has been very quick in recent years. …”
Get full text
Article -
2486
Salt and Pepper Noise Removal with Noise Detection and a Patch-Based Sparse Representation
Published 2014-01-01Get full text
Article -
2487
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01Get full text
Article -
2488
Impact of digital exposure on premarital sex and contraception use among unmarried Indian youth
Published 2025-01-01“…With the widespread use of mobile phones and the internet, attitudes and behaviors towards premarital sexual activities are inevitably shifting. …”
Get full text
Article -
2489
The Role of Public Libraries in Promoting Digital Literacy for Community Empowerment in Western Uganda.
Published 2023“…To evidence this, in Uganda, 36% of the non-internet users are digitally illiterate, and the digital literacy index is still low at 20%. …”
Get full text
Article -
2490
Research and application of media streams based on entropy and FAHP
Published 2020-04-01“…Aiming at the problem of end-to-end user perception evaluation method for mobile internet media streams was still vacant,a method based on entropy and fuzzy hierarchy was proposed to evaluate media streams.Firstly,XDR data indicators were processed by box-line graph method.Then,entropy method and fuzzy hierarchy method were used to revise the evaluation.The whole network process of the whole video service was modified from multi-dimension to realize the perception evaluation of the use of mobile internet video users.At the same time,the end-to-end health evaluation of the network was also realized.The results of a series of simulation experiments show that the proposed method can improve the accuracy of media stream evaluation while avoiding one-sided evaluation of a single index.It provids a method and solution for the optimization of the overall internet quality and multi-dimensional network fault location.…”
Get full text
Article -
2491
Comparative study of anonymous network Tor and I2P
Published 2019-02-01“…Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.…”
Get full text
Article -
2492
Deep Neural Network Model Forecasting for Financial and Economic Market
Published 2022-01-01“…Recently, the Internet financial market has developed rapidly both at home and abroad. …”
Get full text
Article -
2493
Loosing no time to deploy digital economy and digital transformation to spur ICT innovation——The latest ICT development trend showcased in the science and technology award of CIC i...
Published 2021-01-01“…ICT Innovation, industrial development and the new information infrastructure construction, represented by 5G, artificial intelligence, and integrated space-air-ground networks will play an important role in the implementation of the national strategy of building a powerful communications network and comprehensively building a modern socialist country.Based on the current technological development in the ICT field, the China Institute of Communications summarized and sorted out the key directions of technological innovation in this field, including a new generation of mobile communications, network enabling, quantum communications, satellite internet, smart network operation and maintenance, cyberspace security, and the internet of things and the internet of vehicles, network cost reduction and efficiency enhancement, and basic technologies, etc., providing references for all walks of life to understand the technological development in the ICT field.…”
Get full text
Article -
2494
Information seeking by blind and sight impaired citizens: an ecological study
Published 2000-01-01“…The findings of the study address issues of information needs, information sources, the role of the Internet in meeting needs and the barriers to the use of the Internet. …”
Get full text
Article -
2495
Development,challenge and opportunity of optical fiber communication system technologies
Published 2016-05-01“…Optical fiber communication system is one of the core supporting systems of the modern internet age.Firstly,major recent technological advances in optical fiber communication system were summarized.Then,the driving forces for its future development in the emerging cloud era,the future challenges and opportunities that it faced were analyzed.With the consideration of these challenges and opportunities,the future evolution paths in key areas such as optical fiber communication system overall network architectures,core network technologies,metro network technologies,access network technologiesand novel software-defined optical transport network technologies in the upcoming cloud erawere described,aiming to support future generations of internet,data center interconnect,internet of things and 5G mobile network,as well as the smart home and smart city initiativesmore effectively.…”
Get full text
Article -
2496
Green IoT: how wireless sensor networks are paving the way for sustainable smart environments
Published 2023-06-01“…The Internet of Things (IoTs) enables the incorporation and connecting of physical devices to the internet with little human intervention and human-to-human or human-to-PC communication. …”
Get full text
Article -
2497
Research on fusion model based on deep learning for text content security enhancement
Published 2020-05-01“…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
Get full text
Article -
2498
Bilgiyi Süzmek
Published 2011-09-01“…The article deals with the concerns about Secure Internet Law to be enforced on November 22, 2011, and points out that individuals of democratic societies are capable of filtering information and families have a part to play in protecting from the information pollution on the Internet. …”
Get full text
Article -
2499
Characterizing the role of vehicular cloud computing in road traffic management
Published 2017-05-01“…Potential future challenges and emerging technologies, such as the Internet of vehicles and its incorporation in traffic congestion control, are also discussed. …”
Get full text
Article -
2500
Echoing Mechanism of Juvenile Delinquency Prevention and Occupational Therapy Education Guidance Based on Artificial Intelligence
Published 2022-01-01“…The causes of juvenile delinquency in the Internet culture are discussed in terms of the Internet environment, juvenile use of the Internet, Internet supervision, and crime prevention education, respectively. …”
Get full text
Article