Showing 2,581 - 2,600 results of 5,694 for search '"internet"', query time: 0.10s Refine Results
  1. 2581

    Architecture and service model of IoT enabled platform by Zhao PENG

    Published 2017-11-01
    “…Existing successful IoT (internet of things) application cases concentrate on the vertical field of local scale and usually focused on closed loop applications,which leading to numerous application islet.Internet companies,traditional equipment manufacturers,cloud service providers,as well as other industrial giants have built an IoT ecosystem with the core of its own capabilities.Starting with key point of building IoT ecosystem,technology architecture and service model of IoT enabled platform was studied,the core function and key technology of platform was discussed,and the platform development trend was presented.…”
    Get full text
    Article
  2. 2582

    Healthy Living: Reliable Websites by Linda B. Bobroff, Leigh Ann Martin

    Published 2016-02-01
    “…Older adults can readily access reliable information on the Internet by focusing on government and education sites. …”
    Get full text
    Article
  3. 2583

    Constrction of data driven-centric smart home intelligent operating system by Zheng WEI, Weijia SHI, Zhengkai ZHANG

    Published 2017-10-01
    “…From the background of the second half of the internet era,when constructing the smart home intelligent operating system,data-driven should be the foundation,and data evaluation should be the means.By using accurate and efficient data collection methods,the smart home intelligent operating system which adapted the development of future 5G,internet of things and artificial intelligence and other technology was built.Firstly,the characteristics and trends of the smart home business was introduced,and then the opinion of data was the foundation of smart home operation was explained.Finally,the future of data and smart home operation was introduced.…”
    Get full text
    Article
  4. 2584

    Research on the reverse analyses and monitoring data of Mirai malware botnet by Ya-liang CHEN, Qin-yun DAI, Hai-yan WU, Zheng WEI

    Published 2017-08-01
    “…In recent years,with the rapid development of Internet of things(IoT),malwares have come into Internet of things,and botnet is the typical one.Malwares spreading through IoT vulnerable devices have emerged.The overall structure of Mirai botnet and the function of its components were introduced,such as bots and C&C server.The monitoring data obtained through active and passive way were analyzed.Based on that,the discovery methods and response modes on such kind of botnet malwares were discussed.…”
    Get full text
    Article
  5. 2585

    Perception of Advertisement in Visegrad Four Countries by Veronika Gašparíkov, Ľudmila Nagyová, Beáta Rizovová

    Published 2011-06-01
    “…There were almost no statistically significant differences just in the area of Internet advertisement effectiveness where the first position of making electronic purchases due to Internet advertisement is held by Polish respondents.…”
    Get full text
    Article
  6. 2586

    Initial Understanding and Practice of Network Services and Compositions by Dongnian Cheng, Yufeng Li, Hailong Ma, Wanwei Huang

    Published 2013-08-01
    “…The current internet is simple in its fundamental interconnecting capability and is inflexible in its protocol architecture.Such a situation makes internet unable to well handle the variety of network applications' demands.Fortunately,a noval approach of so called“network service composition”can address the above problems.From the rationale of reductionism,the meanings of network services and their compositions were first explained.Several fundamental and key methods of network service composition were then presented,with relevent research projects shown.And finally,the ongoing work in the reconfigurable architecture of network infrastructures was introduced.…”
    Get full text
    Article
  7. 2587

    Brief History of Interlibrary Cooperations in Turkey and Today’s Applications by Halime Atıl Yörü

    Published 2012-03-01
    “…Our world has changed so much in 42 years. The usage of Internet has gradually become widespread since the use of ARPANET for military purposes in 1969. …”
    Get full text
    Article
  8. 2588

    Sobre vivências poéticas no campo da mídia digital by Sayonara Amaral de Oliveira

    Published 2016-01-01
    “…Para desarrollar la reflexión, se analiza el movimiento p oético Poetrix, centrándose en la propuesta estética de este grupo y sus formas de inserción y mantenimiento en internet.…”
    Get full text
    Article
  9. 2589

    A digital signature scheme based on shared key in intelligent terminal by Guorong LIU, Dongxin LIU, Laifu WANG, Jun SHEN, Huamin JIN

    Published 2017-02-01
    “…In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.…”
    Get full text
    Article
  10. 2590

    WEB SİTESİMALİYETLERİNİN MUHASEBELEŞTİRİLMESİ by Ali Alagöz

    Published 2007-08-01
    “…Günlük hayatın her alanına giren internet, iletişimden araştırmaya, alışverişten reklama her alanda yerini almış, ticaretin ve pazarlamanın vazgeçilmez unsurlarından biri haline gelmiştir. …”
    Get full text
    Article
  11. 2591

    Entity-relation modeling and discovery for smart search by Sean WANGX, Xiao-qing ZHENG, Yang-hua XIAO

    Published 2015-12-01
    “…Nowadays,by connecting the mobile networks,Internet of Things and the sensor networks to the Internet,the cyberspace has expanded to a ubiquitous space of human beings,machines and things.Combining with the technology of big data,the traditional search engines are evolving into their next generation—big search (or smart search).Entity-relation modeling and discovery are the key techniques to fulfill the vision of smart search.Approaches to model the entities and their relations in large scale by knowledge graph and knowledge warehouse,and ways to discovery new entities and the relations between them in the cyberspace are discussed.…”
    Get full text
    Article
  12. 2592

    Trustworthy identity system based on IPv6 source address validation by Duan-qi ZHOU, Jun BI, Guang YAO

    Published 2014-10-01
    “…In the Internet,there are no mechanisms to verify the identity of a message sender,resulting in a large number of forged identity attacks,such as phishing websites.By mapping the user identity into the rightmost 64 bit of the IPv6 address,this paper tries to make every message embedded with an identity,which lay a credible foundation for communications on the Internet.We design and realize a true identity communication system based on source address validation improvement,which can protect the privacy of the users,and ensure the verifiability and authenticity of the user identities.…”
    Get full text
    Article
  13. 2593

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…It operates independently of an internet connection, making it a standalone system and saving costs.…”
    Get full text
    Article
  14. 2594

    PROFILES OF FILIPINO TEACHERS AND THEIR ONLINE TEACHING COMPETENCIES DURING THE PANDEMIC by Dave Marcial, Aurielle Lisa Z. Maypa, Cindy Ruth R. Villariza, Grace L. Apao

    Published 2024-02-01
    “…Specifically, this paper examines the respondent's internet usage, social media ownership, and social technographic profiles. …”
    Get full text
    Article
  15. 2595

    Vida Saludable: Sitios web confiables by Linda B. Bobroff, Leigh Ann Martin

    Published 2015-12-01
    “…Older adults can readily access reliable information on the Internet by focusing on government and education sites. …”
    Get full text
    Article
  16. 2596

    Research on PaaS Platform Opening Capability of Smart Pipe by 赵学军, 陆钢, 何震苇

    Published 2013-12-01
    “…In the time of mobile internet, the platform has become the focus of competition in the field of operators and internet companies, the open core capabilities has become the key to success of the platform. …”
    Get full text
    Article
  17. 2597

    GlobeSen:an interconnection framework of information-centric IoT by Bo CHEN, Liang LIU, Hua-dong MA

    Published 2017-09-01
    “…Interconnection framework of information-centric IoT:GlobeSen was proposed,which implemented the efficient interconnection of sensor networks and Internet.According to the characteristic of weak network elements,such as wireless sensor nodes,and the spatio-temporal relationship of sensory data,an information-centric network protocol for sensor networks NDNs was designed.Then,a protocol translation mechanism in the gateway was designed to interconnect NDNs and NDNx that running in Internet.A prototype by using the TelosB wireless sensor node and ARM board was implemented,and the proposed design by deploying the prototype in the environment was evaluated.…”
    Get full text
    Article
  18. 2598

    STRATEGIC POSITIONING OF AGRICULTURAL FINANCIAL PRODUCTS by Tzvetelina Borisova

    Published 2025-01-01
    “…This requires the followers of the theory, as well as all researchers of the problem, to connect positioning with the science of personality psychology. Today, thanks to internet connectivity, smart mobile devices, and the Internet of Things, positioning is done by creating complex patterns of consumer behavior for goods and services. …”
    Get full text
    Article
  19. 2599

    Investigation on the botnets activities by HAN Xin-hui1, GUO Jin-peng1, ZHOU Yong-lin2, ZHUGE Jian-wei1, ZOU Wei1

    Published 2007-01-01
    “…Botnets have become the first-choice attack platform for the network attackers to launch distributed denial of service attacks,steal sensitive information and send spam.They have raised serious threats to normal operation of the Internet and the benefits of the Internet users.The investigation on the wild botnets activities is the necessary for the fur-ther monitering and countermeasure against world-wide botnets.Based on the investigation and analysis on tracking re-cords of 1 961 wild botnets,it shows the statistical results of botnet activities,including amount of botnets,command and control channel distributions,botnet size and end-host distributions,and various types of botnet attack activities.…”
    Get full text
    Article
  20. 2600

    Resource public key infrastructure RPKI: status and problems by Yingying SU, Dan LI, Honglin YE

    Published 2021-03-01
    “…The BGP (border gateway protocol) did not fully consider security issues at the beginning of its design.With the rapid growth of the Internet, its security risks have become incrementally obvious.Academia and industry have proposed many solutions to the security issues faced by inter-domain routing, and what is really deployed is the RPKI (resource public key infrastructure) promoted by the IETF (the Internet Engineering Task Force).The development status and research advances of RPKI were surveyed, with emphasis on problems of RPKI, existing solutions, and related limitations.Moreover, latest achievements on RPKI function extension were introduced.Finally, future research directions were concluded.…”
    Get full text
    Article