Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
2761
An Effective Method of Monitoring the Large-Scale Traffic Pattern Based on RMT and PCA
Published 2010-01-01“…The simulation results show that using about 10% of nodes as observation points, our method can monitor and extract key information about Internet traffic patterns.…”
Get full text
Article -
2762
Model Predictive Control of NCS with Data Quantization and Bounded Arbitrary Time Delays
Published 2015-01-01Get full text
Article -
2763
Environmental scanning: how developed is information acquisition in Western European companies?
Published 2005-01-01“…A number of theoretical works focus on the potential revolutionary impact of the Internet and other Information and Communication Technologies (ICT) upon Competitive Intelligence, but only a few empirical research papers can be found on it. …”
Get full text
Article -
2764
Poder disciplinar e discursos de ódio
Published 2025-01-01“…As ideias de Foucault, apesar de serem anteriores à massificação do acesso à internet, são capazes de jogar luz à era digital, onde as redes sociais são utilizadas como forma de controle. …”
Get full text
Article -
2765
Distributed Sliding Mode Fault-Tolerant LFC for Multiarea Interconnected Power Systems under Sensor Fault
Published 2022-01-01Get full text
Article -
2766
Optimizing Palm Oil Plantation Productivity Using Offline Blockchain and Drone Rover Solutions
Published 2024-12-01“…The increasing demand for sustainable palm oil production challenges plantations to maintain efficient management and data transparency, particularly in remote areas with limited internet access. This study aims to develop and implement an offline blockchain system integrated with drone rover devices to support data collection and decision-making without internet connectivity. …”
Get full text
Article -
2767
Dynamical Behaviors of Rumor Spreading Model with Control Measures
Published 2014-01-01“…Besides that, monitoring the internet to prevent the spread of rumor is more important than deleting messages in media which already existed. …”
Get full text
Article -
2768
Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture
Published 2012-01-01“…Multiprotocol medical imaging communication through the Internet is more flexible than the tight DICOM transfers. …”
Get full text
Article -
2769
Big data security analysis method based on self-update threat intelligence database
Published 2018-03-01“…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
Get full text
Article -
2770
FÜTÜRİSTİK BİR KAMUSAL ALAN ALTERNATİFİ OLARAK METAVERSE
Published 2023-03-01“…Yüzyılın sonlarında ortaya çıkan internet teknolojisi kamusal alan tartışmaları için yeni bir başlık açmıştır. …”
Get full text
Article -
2771
-
2772
AKADEMİK YAŞANTIDA SANAL TEHDİTLER VE VAKALAR ÜZERİNE BİR ANALİZ - AN ANALYSIS THROUGH CASES AND CYBER THREATS IN ACADEMIC LIFE
Published 2018-06-01“…Çalışma bubağlamda internet üzerinden gerçekleşen dolandırıcılık yöntemlerini kavramsalolarak ele almaktadır. …”
Get full text
Article -
2773
Information Spread of Emergency Events: Path Searching on Social Networks
Published 2014-01-01“…Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. …”
Get full text
Article -
2774
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
Get full text
Article -
2775
Intent-driven cloud-network convergence on-demand orchestration
Published 2022-10-01“…With the rapid development of cloud computing and Internet technology, user service demands show a diversified development trend, and cloud-network convergence has become an important choice for the development of the current information and communication industry.At present, cloud-network convergence only achieves simple cloud-network interconnection, which can not overcome the heavy problems of diversified service demands and massive heterogeneous resource supply.Therefore, promoting cloud-network convergence still requires strengthening the on-demand delivery capability of cloud services.Intent-driven network, as a new networking paradigm, becomes a viable option to solve this dilemma.The research status of cloud-network convergence was sorted out, and the research necessity of intention-driven cloud-network convergence business on-demand orchestration was summarized.Furthermore, the intent-driven cloud-network convergence architecture and its key technologies were proposed and analyzed, and on this basis, an on-demand orchestration model of cloud business was proposed.Finally, in the hybrid cloud interconnection and industrial Internet scenarios, the intent-driven on-demand orchestration model of cloud business was analyzed, and the future prospects were introduced.…”
Get full text
Article -
2776
Research on the Simulation Application of Data Mining in Urban Spatial Structure
Published 2020-01-01“…Data mining and simulation of the Internet of things (IOT) have been applied more and more widely in the rapidly developing urban research discipline. …”
Get full text
Article -
2777
Something old, something new: preliminary findings from an exploratory study about people's information habits and information grounds
Published 2005-01-01“…</b> People have information grounds from which the acquire information and the Internet is emerging as a popular information ground. …”
Get full text
Article -
2778
Leadership Networks as a Tool of Coercion in World Politics
Published 2020-03-01“…Opinion leaders are increasingly participating in social media. The Internet is a reflection of the real world, it has the same laws as in real society. …”
Get full text
Article -
2779
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01“…The security of communication between Internet of Things devices is a big concern in this field, and with the increase in the number of devices and users, the current architecture and communication protocols cannot adequately respond to the system's needs, such as authentication and access authorization. …”
Get full text
Article -
2780
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01“…Cyberspace is the virtual space created through the linkages of the internet and internet devices. Because of certain developments, cyberspace is now considered the fifth operational domain for warfare, with the other four domains being land, sea, air, and space. …”
Get full text
Article