Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
2741
On-Demand Beam Scheduling Technology of Low-Orbit High-Throughput Satellite
Published 2022-06-01“…Low-orbit high-throughput satellite internet can satisfy the increasing speed and connection density requirements of end users and provide users with all-weather low-latency ultra-broadband communication services.At the same time, how to adapt to the fl exible and unevenly distributed terrestrial service requirements in low-orbit downlink scenarios and improve system throughput is an urgent problem to be solved.Based on the modeling of the beamforming architecture of the low-orbit highthroughput satellite downlink system and the satellite-to-earth fading of the low-orbit satellite and the inter-beam interference of the high-throughput satellite, the low-orbit high-throughput satellite downlink channel model was established.Based on the research of the high-throughput satellite on-demand beam scheduling scheme, the beam scheduling optimization problem model was established to ensured the utilization of resources, and the on-demand beam scheduling technology for high-throughput satellite internet was proposed, the method of using a small amount of beams to cover multiple cells by using on-demand time division multiplexing improved the utilization rate of resources, effectively suppressed the interference between beams, and improved the throughput of the system.…”
Get full text
Article -
2742
Gender Differences in Online Behavior: Exploring the Moderating Effect on Loneliness and Cyberslacking among University Students
Published 2024-06-01“…Academic demands are capable of creating pressure, prompting students to find diversion through smartphone use and internet browsing. Unproductive internet use during learning is termed cyberslacking, a behavior known to be associated with loneliness. …”
Get full text
Article -
2743
Detecting and Predicting Models for QoS Optimization in SDN
Published 2024-01-01“…Recently, deep learning algorithms and software-defined networking technologies enabled traffic management to be more controllable in IP networking and mobile Internet to yield quality services to subscribers. …”
Get full text
Article -
2744
Web Services Integration Strategy with Minimum Hops Constraint in Wireless Sensor Networks
Published 2014-02-01“…However, web service is based on Internet protocols and requires adaptation to suit the restrictions posed by WSNs. …”
Get full text
Article -
2745
Advertising credibility across media channels
Published 2022-10-01“…This study explores the credibility of traditional media advertising versus new media advertising, the credibility of broadcast-media advertising versus print-media advertising, the credibility of cellphone advertising versus Internet advertising, and the relationship between the credibility of Internet advertising and likelihood of Generation Y consumers shopping online. …”
Get full text
Article -
2746
Delitos no meio digital e suas relações
Published 2024-12-01“…A democratização da internet foi um marco importante na vida das pessoas, porém, trouxe consigo preocupações no tocante a navegar com segurança. …”
Get full text
Article -
2747
Connection Characteristics and Hierarchical Structure of China’s Urban Network-Based on the Communications Technology Service Industry
Published 2022-01-01“…Considering the importance of China’s digital economy, industrial Internet, and high-quality development, this study analyzed China’s urban network from the perspective of the communications technology service industry. …”
Get full text
Article -
2748
An Intelligent Framework for Website Usability
Published 2014-01-01“…With the major advances of the Internet throughout the past couple of years, websites have come to play a central role in the modern marketing business program. …”
Get full text
Article -
2749
İlköğretim İkinci Kademe Öğrencilerinin Değerlerini Yordayan İki Önemli Değişken: Siber Zorbalık Eğilimleri ve Okul Kültürü Arasındaki İlişki
Published 2013-12-01“…Araştırmadan elde edilen bulgular, siber zorbalık ile okul kültürünün alt boyutu olan katı kurallara bağlılık arasında pozitif düzeyde ilişki olduğu; kız ve erkek öğrenciler arasında siber zorbalık açısından anlamlı bir farklılık olduğu; haftalık internet kullanım sıklığının siber mağduriyeti yordamadığı fakat haftalık internet kullanım sıklığı yüksek olan öğrencilerin daha fazla siber zorbalık yaptıkları; cinsiyet ve sosyoekonomik düzeyin siber zorba ve siber mağduriyeti yordamadığı bulgulanmıştır.…”
Get full text
Article -
2750
Target Recognition Technology of Multimedia Platform Based on a Convolutional Neural Network
Published 2022-01-01“…With the rapid development of the Internet, network media, as a new form of information dissemination, has penetrated into people’s daily life. …”
Get full text
Article -
2751
الاسترجاع الموضوعى فى فهرس المکتبة المرکزیة الجدیدة بجامعة القاهرة وأثره على کفاءة الفهرس : دراسة تطبیقیة...
Published 2017-10-01“…The study addressed the online catalog of the New Central Library of CairoUniversity is available on the Internet in terms of measuring the efficiency of thesubject searching, This catalog was addressed three major themes: First: Studysearch interfaces in this catalog to determine the types and levels of searchdone, Second, measuring the extent to commitment responsible for subjectanalysis of new central library catalog application of subject cataloging rules,Third, determine the accuracy of the application of Marc bibliographic terms ofSubject Access points (6xx) used in bibliographic records listed on the catalogunderstudy, As well as for indicators and identifiers to them.The study adopted in dealing with this catalog on two methods : first, thecase study method, while the second is descriptive analytical method, the datacollection tools are represented in the direct examination of the subject headingsand bibliographic records listed on the online catalog of the new Central Libraryof the Cairo University, The information was collected concerning the proceduresfor subject analysis, and its steps, and tools of the page devoted to that availableCentral Library site on the Internet.…”
Get full text
Article -
2752
Modeling Peer-to-Peer Botnet on Scale-Free Network
Published 2014-01-01“…Peer-to-peer (P2P) botnets have emerged as one of the serious threats to Internet security. To prevent effectively P2P botnet, in this paper, a mathematical model which combines the scale-free trait of Internet with the formation of P2P botnet is presented. …”
Get full text
Article -
2753
Neoliberalismo y Modernización del Estado en Chile: Emergencia del Gobierno Electrónico y desigualdad social
Published 2024-06-01“…Finalmente, se aborda el surgimiento de nuevas formas de desigualdad entre ciudadanos, respecto al acceso a los servicios del estado disponibles en Internet. …”
Get full text
Article -
2754
Distributed Risk Aversion Parameter Estimation for First-Price Auction in Sensor Networks
Published 2013-12-01“…Following the Internet, the Internet of Things (IoT) becomes a prime vehicle for supporting auction. …”
Get full text
Article -
2755
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. …”
Get full text
Article -
2756
Active-probing based distributed malware master detection system
Published 2013-08-01“…Nowadays, botnet is still a kind of severe threat on the Internet. It wastes lots of time for traditional passive monitoring approaches to collect enough evidence, to detect and react. …”
Get full text
Article -
2757
Multi-node cooperative distributed offloading strategy in V2X scenario
Published 2022-02-01“…In order to cope with the dynamic changes of the offloading environment for computing resource-intensive and separable tasks in Internet of vehicle and deal with the problem that different collaborative nodes had different communication and computing resources, a distributed offloading strategy that multiple collaborative nodes had serial offloading mode and parallel computing mode in vehicle to everything (V2X) scenario was proposed.Utilizing the predictable motion trajectories of vehicle, the tasks were split into unequal parts, finally each part was computed on itself, mobile edge server, and vehicles in parallel.Then an optimization problem of the system time delay minimization was established.To solve the optimization problem, an offloading scheme based on the game theory was designed to determine the serial offloading execution order of the cooperative nodes.Considering the dynamic characteristics of Internet of vehicles, a sequential quadratic programming (SQP) algorithm was adopted to optimally split tasks.Finally, the simulation results show that the proposed strategy can effectively reduce system delay, and when multiple cooperative nodes offload in parallel, the proposed strategy can still maintain the stable system performance under the different parameter conditions.…”
Get full text
Article -
2758
Original scientific paper optimization of ventilation using IIOT methodology in Serbian coal mines
Published 2024-01-01“…Some global mining companies have already implemented numerous technical solutions in the field of robotics, artificial intelligence and the Internet of Things (IoT). This article describes the basic principles of the Industrial Internet of Things (IIoT) and the configuration of the automation system for ventilation. …”
Get full text
Article -
2759
A ESCOLA ENQUANTO ESPAÇO DE REPRODUÇÃO DA EXCLUSÃO DIGITAL
Published 2014-04-01“… A crescente apropriação social das novas tecnologias de comunicação e informação (NTCI), e em especial da Internet, é um dos fenômenos globais mais marcantes dos últimos vinte anos. …”
Get full text
Article -
2760
Establishment of Big Data Index System of Water Resources Scheduling in Pearl River Basin
Published 2020-01-01“…Therefore, it is urgent toconstruct a set of big data index system for water resources scheduling in Pearl River Basin.Under the guidance of binary water cycle theory, and based on analytic hierarchy process andinformation resource planning method, this paper determines the six goals, i.e. flood control,power generation, water supply, saltwater resistance, shipping and ecological security in PearlRiver Basin, and fuses the measured data such as hydrometeorology, stage-discharge, water qualityand water ecology during water resources scheduling in the Pearl River Basin under the conditionof the Internet of Things and auxiliary information such as humanity and economy, ecologicalenvironment, flood disaster and Internet, classifies all indexes of the pressure term, state termand response term, and establishes the big data index system of water resources scheduling inPearl River Basin based on “Pressure-State-Response (PSR)”model, which provides a decision basisfor water resources management and scheduling in Pearl River Basin.…”
Get full text
Article