Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
241
Industrial intelligent network: deepening and upgrading of industrial Internet
Published 2018-12-01“…For this reason, the concepts of “Industrial Internet” and “Industry 4.0” was proposed by united state, Germany and other technologied, and formulated manufacturing development strategies suited to their national conditions. …”
Get full text
Article -
242
Cognitive mechanisms and emergent grammatical features in Internet memes
Published 2018-12-01Subjects: “…Internet memes…”
Get full text
Article -
243
-
244
Key Technology of Smart Network in Mobile Internet Environment
Published 2013-09-01Subjects: Get full text
Article -
245
Global Internet Governance: Russian Approach and International Practice
Published 2015-08-01Subjects: “…internet governance…”
Get full text
Article -
246
Research Prospect of Anti-Jamming Strategy for the Satellite Internet
Published 2022-03-01Subjects: “…satellite internet…”
Get full text
Article -
247
Summary of wireless indoor positioning technology in industry Internet
Published 2020-06-01Subjects: Get full text
Article -
248
Analysis on marine monitoring and data service of marine internet
Published 2018-06-01Subjects: Get full text
Article -
249
Anonymous group key distribution scheme for the internet of vehicles
Published 2023-10-01Subjects: “…internet of vehicles…”
Get full text
Article -
250
Problematic internet use and its relationship with eating disorders
Published 2025-01-01Subjects: “…problematic internet use…”
Get full text
Article -
251
Analysis and prospects of the development of the industrial Internet in the petrochemical industry
Published 2021-09-01Subjects: Get full text
Article -
252
Personal Peacefulness and Cyber-Bystanding of Internet Users in Indonesia
Published 2024-06-01“… Purpose – As internet use grows, cyberbullying has become more common, especially in schools. …”
Get full text
Article -
253
Analysis of Development Trend and Technology of New Generation Internet
Published 2013-04-01Subjects: “…new generation internet…”
Get full text
Article -
254
Research on Wi-Fi HaLow for the Internet of things
Published 2019-09-01Subjects: Get full text
Article -
255
Internet worm propagation model based on Markov chain
Published 2015-05-01Subjects: Get full text
Article -
256
Internet bad information detection based on Bert model
Published 2020-11-01“…In view of the business scenario of bad information detection on the internet,the method of detection based on the text content of the website was discussed .Classical text analysis techniques were reviewed.The key technical features and two different usages of Bert model were introduced.The specific implementation scheme of using the feature extraction method to detect website bad information was described in detail,and was compared with the traditional TF-IDF model and word2vec+LSTM model.The validity of this method is verified.…”
Get full text
Article -
257
Overview of anomaly detection techniques for industrial Internet of things
Published 2022-03-01Subjects: “…industrial Internet of things…”
Get full text
Article -
258
-
259
Monitoring Heart Disease and Diabetes with Mobile Internet Communications
Published 2012-01-01“…Using a combination of mobile device applications and web browser, the data can be stored, accessed, and displayed using mobile internet communications to the central server. As an extra layer of security in the data transmission, information embedded in the data is used in its verification. …”
Get full text
Article -
260