Showing 2,521 - 2,540 results of 5,694 for search '"internet"', query time: 0.09s Refine Results
  1. 2521

    Mobile-Commerce Usage Challenges among University Students in Uganda: A Case of Kabale University. by Phelix, Businge Mbabazi, Micheal, Tamale, Patricia, Kyomugisha

    Published 2020
    “…University students contribute a big percentage of internet Users in Uganda yet their participation in M-commerce is not felt or least felt in most cases. …”
    Get full text
    Article
  2. 2522
  3. 2523

    Communautés en ligne et mesure de l’opinion by Romain Badouard

    Published 2016-01-01
    “…This article looks at a certain method of conducting online surveys based on the principle of internet users, which is referred to as . Large numbers of potential customers of a given product or service are gathered together in a closed forum and to more or less freely talk about their practices. …”
    Get full text
    Article
  4. 2524

    Web Sayfalarının Düzenlenmesi ve Bilgi Merkezleri by Sacit Arslantekin

    Published 2001-03-01
    “…Bu yazı, özellikle, bilgi merkezlerinin internet üzerinde sundukları web sayfalarının düzenlenmesinde dikkat edilecek bazı temel noktaları açıklamayı amaçlamaktadır.…”
    Get full text
    Article
  5. 2525

    Research on the Impact of Regional Economy on Industrial Development from the Perspective of Big Data by Lu Zhang, Dong Zhao, Siheng Li, Han Xiao, Jianjun Bu, Marvin White

    Published 2021-01-01
    “…In order to study the driving force of China’s rapid economic development in the past ten years, the study takes Guizhou, Yunnan, and Guangxi as a case study, focusing on the big data assets exchange (GBDEx) and Beibu Gulf Economic Zone, and discusses the impact of Internet plus economic and government data and the big data system on regional economy. …”
    Get full text
    Article
  6. 2526

    ELT in Covid-19-Augmented-Technological-Educational Ambience at the Private Universities in Bangladesh by Md. Nazmul Haque

    Published 2022-12-01
    “…In addition, it also suggests that uninterrupted internet network and power supply, high-speed internet, and fair virtual assessment should be ensured. …”
    Get full text
    Article
  7. 2527

    Service migration of heterogeneous cloud computing platform by Feng WEI, Fei DING, Pengju JIAO, Yang LI, Yanshan CHEN, Dengyin ZHANG

    Published 2020-12-01
    “…With the rapid development of 5G communication technology,Internet+ and the Internet of things (IoT),cloud computing as an Internet-based virtual resource management and a distributed computing technology,provides services to users in a dynamic,on-demand and measurable manner.The solution of migrating the service platform to the cloud computing platform can realize rapid service deployment and effectively save service innovation and operating cost.With the research of the cloud computing platform-based service migration technology,the China Mobile’s OpenStack-based cloud computing architecture was taken as an example.The technical principles and core points of the mainstream service migration schemes were analyzed,such as offline migration,online migration based on platform functions,online service migration based on the agent block level and online service migration based on agent file level.The general service migration process and method were also given.Finally,three types of online migration schemes were experimentally verified through the actual platform.The technical advantages and adaptation scenarios were analyzed separately to guide the production practice of future business migration.…”
    Get full text
    Article
  8. 2528

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. …”
    Get full text
    Article
  9. 2529

    Improved grey wolf optimization algorithm based service function chain mapping algorithm by Yue ZHANG, Junnan ZHANG, Xiaochun WU, Chen HONG, Jingjing ZHOU

    Published 2022-11-01
    “…With the rise of new Internet applications such as the industrial Internet, the Internet of vehicles, and the metaverse, the network’s requirements for low latency, reliability, security, and certainty are facing severe challenges.In the process of virtual network deployment, when using network function virtualization technology, there were problems such as low service function chain mapping efficiency and high deployment resource overhead.The node activation cost and instantiation cost was jointly considered, an integer linear programming model with the optimization goal of minimizing the average deployment network cost was established, and an improved grey wolf optimization service function chain mapping (IMGWO-SFCM) algorithm was proposed.Three strategies: mapping scheme search based on acyclic KSP algorithm, mapping scheme coding and improvement based on reverse learning and nonlinear convergence were added to the standard grey wolf optimization algorithm to form this algorithm.The global search and local search capabilities were well balanced and the service function chain mapping scheme was quickly determined by IMGWO-SFCM.Compared with the comparison algorithm, IMGWO-SFCM reduces the average deployment network cost by 11.86% while ensuring a higher service function chain request acceptance rate.…”
    Get full text
    Article
  10. 2530
  11. 2531

    Optimization of the Marketing Management System Based on Cloud Computing and Big Data by Lin Zhang

    Published 2021-01-01
    “…With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications. …”
    Get full text
    Article
  12. 2532

    Sosyal Medya’da Mardin İle İlgili Fotoğrafların Turistik Pazarlama Açısından İncelenmesi by Serhat Harman, Mehmet Zeynel Eyyüpoğlu

    Published 2020-10-01
    “…İnternet teknolojisi sayesinde bilgi kısa sürede çok fazla internet kullanıcısına ulaşabilmektedir. …”
    Get full text
    Article
  13. 2533

    Arogyasree: An Enhanced Grid-Based Approach to Mobile Telemedicine by Sriram Kailasam, Santosh Kumar, Janakiram Dharanipragada

    Published 2010-01-01
    “…Lastly, the system uses the existing internet infrastructure and supports mobility at doctor and patient ends.…”
    Get full text
    Article
  14. 2534

    Determining the Factors of Social Phobia Levels of University Students: A Logistic Regression Analysis by Hamit Ozen

    Published 2016-01-01
    “…In respect to Odds rates, the most crucial factor about PEF of students is the time spent daily on the internet. Students who spend their time on the internet have PEF 2.4 times more than those who do not. …”
    Get full text
    Article
  15. 2535

    Лексические инновации в мемосфере: названия мемных жанров by Olga Makarowska

    Published 2020-10-01
    “…The development of the Internet gave life to Internet memes. Their diversity and rapid growth contributed to the formation of the memosphere, the development of which is accompanied by the emergence of lexical innovations. …”
    Get full text
    Article
  16. 2536

    Time-varying interlinkages between digitalization, globalization, and carbon emission in Vietnam by Pham Hong Chuong, To Trung Thanh, Le Thanh Ha

    Published 2025-02-01
    “…Our results indicate that the Internet outbreak significantly determined the system-wide dynamic connectedness, especially between 1999 and 2006. …”
    Get full text
    Article
  17. 2537

    COVID-19 and Emergency Migration to Remote Teaching in a Public University in the Maldives: Challenges, Solutions, and Lessons Learned by Dheeba Moosa, Visama Hassan

    Published 2024-06-01
    “…The respondents most frequently cited unreliable internet connection (83.9%) and internet cost (76.8%), while 75% reported difficulty in motivating students and meeting their varied needs (64.3%). …”
    Get full text
    Article
  18. 2538
  19. 2539

    APT attack threat-hunting network model based on hypergraph Transformer by Yuancheng LI, Yukun LIN

    Published 2024-02-01
    “…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
    Get full text
    Article
  20. 2540

    Application of 5G to current differential protection of distribution network by Yuxiang LV, Yang YANG, Yawen DONG, Yucheng WANG

    Published 2020-02-01
    “…Driven by the strategy of grid as a Platform,Hub,and Sharing as well as the construction of Energy Internet and Ubiquitous power Internet of Things declared by Sate Grid Corporation of China,the intelligent distribution network evolves towards Distribution Internet of Things in a gridding and multi-source manner.The traditional distribution network protection and feeder automation barely meets the self-healing requirements of a strong distribution network.The current differential protection is prevailing due to its favorable quick-acting,sensitivity and selectivity.The existing communication solutions baring protection signals includes:fiber channel,230MHz/1.8GHz private wireless network,etc.However,the above methods are usually costly and perhaps with poor stability and low real-time performance.An realistic baring scheme for current differential protection of distribution network over the fifth generation communication system (5G) was proposed,where the of sampling data transmission between differential protection devices was realized based on 5G new radio technology.Thanks to the advantages of low latency,high capacity,security,etc.,5G-based differential protection can dynamically adjust the configuration to accommodate the topology changes,and thus can reduce the transformation and maintenance cost of distribution network.…”
    Get full text
    Article