Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
2581
Architecture and service model of IoT enabled platform
Published 2017-11-01“…Existing successful IoT (internet of things) application cases concentrate on the vertical field of local scale and usually focused on closed loop applications,which leading to numerous application islet.Internet companies,traditional equipment manufacturers,cloud service providers,as well as other industrial giants have built an IoT ecosystem with the core of its own capabilities.Starting with key point of building IoT ecosystem,technology architecture and service model of IoT enabled platform was studied,the core function and key technology of platform was discussed,and the platform development trend was presented.…”
Get full text
Article -
2582
Healthy Living: Reliable Websites
Published 2016-02-01“…Older adults can readily access reliable information on the Internet by focusing on government and education sites. …”
Get full text
Article -
2583
Constrction of data driven-centric smart home intelligent operating system
Published 2017-10-01“…From the background of the second half of the internet era,when constructing the smart home intelligent operating system,data-driven should be the foundation,and data evaluation should be the means.By using accurate and efficient data collection methods,the smart home intelligent operating system which adapted the development of future 5G,internet of things and artificial intelligence and other technology was built.Firstly,the characteristics and trends of the smart home business was introduced,and then the opinion of data was the foundation of smart home operation was explained.Finally,the future of data and smart home operation was introduced.…”
Get full text
Article -
2584
Research on the reverse analyses and monitoring data of Mirai malware botnet
Published 2017-08-01“…In recent years,with the rapid development of Internet of things(IoT),malwares have come into Internet of things,and botnet is the typical one.Malwares spreading through IoT vulnerable devices have emerged.The overall structure of Mirai botnet and the function of its components were introduced,such as bots and C&C server.The monitoring data obtained through active and passive way were analyzed.Based on that,the discovery methods and response modes on such kind of botnet malwares were discussed.…”
Get full text
Article -
2585
Perception of Advertisement in Visegrad Four Countries
Published 2011-06-01“…There were almost no statistically significant differences just in the area of Internet advertisement effectiveness where the first position of making electronic purchases due to Internet advertisement is held by Polish respondents.…”
Get full text
Article -
2586
Initial Understanding and Practice of Network Services and Compositions
Published 2013-08-01“…The current internet is simple in its fundamental interconnecting capability and is inflexible in its protocol architecture.Such a situation makes internet unable to well handle the variety of network applications' demands.Fortunately,a noval approach of so called“network service composition”can address the above problems.From the rationale of reductionism,the meanings of network services and their compositions were first explained.Several fundamental and key methods of network service composition were then presented,with relevent research projects shown.And finally,the ongoing work in the reconfigurable architecture of network infrastructures was introduced.…”
Get full text
Article -
2587
Brief History of Interlibrary Cooperations in Turkey and Today’s Applications
Published 2012-03-01“…Our world has changed so much in 42 years. The usage of Internet has gradually become widespread since the use of ARPANET for military purposes in 1969. …”
Get full text
Article -
2588
Sobre vivências poéticas no campo da mídia digital
Published 2016-01-01“…Para desarrollar la reflexión, se analiza el movimiento p oético Poetrix, centrándose en la propuesta estética de este grupo y sus formas de inserción y mantenimiento en internet.…”
Get full text
Article -
2589
A digital signature scheme based on shared key in intelligent terminal
Published 2017-02-01“…In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.…”
Get full text
Article -
2590
WEB SİTESİMALİYETLERİNİN MUHASEBELEŞTİRİLMESİ
Published 2007-08-01“…Günlük hayatın her alanına giren internet, iletişimden araştırmaya, alışverişten reklama her alanda yerini almış, ticaretin ve pazarlamanın vazgeçilmez unsurlarından biri haline gelmiştir. …”
Get full text
Article -
2591
Entity-relation modeling and discovery for smart search
Published 2015-12-01“…Nowadays,by connecting the mobile networks,Internet of Things and the sensor networks to the Internet,the cyberspace has expanded to a ubiquitous space of human beings,machines and things.Combining with the technology of big data,the traditional search engines are evolving into their next generation—big search (or smart search).Entity-relation modeling and discovery are the key techniques to fulfill the vision of smart search.Approaches to model the entities and their relations in large scale by knowledge graph and knowledge warehouse,and ways to discovery new entities and the relations between them in the cyberspace are discussed.…”
Get full text
Article -
2592
Trustworthy identity system based on IPv6 source address validation
Published 2014-10-01“…In the Internet,there are no mechanisms to verify the identity of a message sender,resulting in a large number of forged identity attacks,such as phishing websites.By mapping the user identity into the rightmost 64 bit of the IPv6 address,this paper tries to make every message embedded with an identity,which lay a credible foundation for communications on the Internet.We design and realize a true identity communication system based on source address validation improvement,which can protect the privacy of the users,and ensure the verifiability and authenticity of the user identities.…”
Get full text
Article -
2593
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…It operates independently of an internet connection, making it a standalone system and saving costs.…”
Get full text
Article -
2594
PROFILES OF FILIPINO TEACHERS AND THEIR ONLINE TEACHING COMPETENCIES DURING THE PANDEMIC
Published 2024-02-01“…Specifically, this paper examines the respondent's internet usage, social media ownership, and social technographic profiles. …”
Get full text
Article -
2595
Vida Saludable: Sitios web confiables
Published 2015-12-01“…Older adults can readily access reliable information on the Internet by focusing on government and education sites. …”
Get full text
Article -
2596
Research on PaaS Platform Opening Capability of Smart Pipe
Published 2013-12-01“…In the time of mobile internet, the platform has become the focus of competition in the field of operators and internet companies, the open core capabilities has become the key to success of the platform. …”
Get full text
Article -
2597
GlobeSen:an interconnection framework of information-centric IoT
Published 2017-09-01“…Interconnection framework of information-centric IoT:GlobeSen was proposed,which implemented the efficient interconnection of sensor networks and Internet.According to the characteristic of weak network elements,such as wireless sensor nodes,and the spatio-temporal relationship of sensory data,an information-centric network protocol for sensor networks NDNs was designed.Then,a protocol translation mechanism in the gateway was designed to interconnect NDNs and NDNx that running in Internet.A prototype by using the TelosB wireless sensor node and ARM board was implemented,and the proposed design by deploying the prototype in the environment was evaluated.…”
Get full text
Article -
2598
STRATEGIC POSITIONING OF AGRICULTURAL FINANCIAL PRODUCTS
Published 2025-01-01“…This requires the followers of the theory, as well as all researchers of the problem, to connect positioning with the science of personality psychology. Today, thanks to internet connectivity, smart mobile devices, and the Internet of Things, positioning is done by creating complex patterns of consumer behavior for goods and services. …”
Get full text
Article -
2599
Investigation on the botnets activities
Published 2007-01-01“…Botnets have become the first-choice attack platform for the network attackers to launch distributed denial of service attacks,steal sensitive information and send spam.They have raised serious threats to normal operation of the Internet and the benefits of the Internet users.The investigation on the wild botnets activities is the necessary for the fur-ther monitering and countermeasure against world-wide botnets.Based on the investigation and analysis on tracking re-cords of 1 961 wild botnets,it shows the statistical results of botnet activities,including amount of botnets,command and control channel distributions,botnet size and end-host distributions,and various types of botnet attack activities.…”
Get full text
Article -
2600
Resource public key infrastructure RPKI: status and problems
Published 2021-03-01“…The BGP (border gateway protocol) did not fully consider security issues at the beginning of its design.With the rapid growth of the Internet, its security risks have become incrementally obvious.Academia and industry have proposed many solutions to the security issues faced by inter-domain routing, and what is really deployed is the RPKI (resource public key infrastructure) promoted by the IETF (the Internet Engineering Task Force).The development status and research advances of RPKI were surveyed, with emphasis on problems of RPKI, existing solutions, and related limitations.Moreover, latest achievements on RPKI function extension were introduced.Finally, future research directions were concluded.…”
Get full text
Article