Showing 2,761 - 2,780 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 2761

    An Effective Method of Monitoring the Large-Scale Traffic Pattern Based on RMT and PCA by Jia Liu, Peng Gao, Jian Yuan, Xuetao Du

    Published 2010-01-01
    “…The simulation results show that using about 10% of nodes as observation points, our method can monitor and extract key information about Internet traffic patterns.…”
    Get full text
    Article
  2. 2762
  3. 2763

    Environmental scanning: how developed is information acquisition in Western European companies? by David Benczur

    Published 2005-01-01
    “…A number of theoretical works focus on the potential revolutionary impact of the Internet and other Information and Communication Technologies (ICT) upon Competitive Intelligence, but only a few empirical research papers can be found on it. …”
    Get full text
    Article
  4. 2764

    Poder disciplinar e discursos de ódio by Ricardo Manoel Oliveira Morais, Ana Gonçalves Soares Pena, Bruna Soares Novais

    Published 2025-01-01
    “…As ideias de Foucault, apesar de serem anteriores à massificação do acesso à internet, são capazes de jogar luz à era digital, onde as redes sociais são utilizadas como forma de controle. …”
    Get full text
    Article
  5. 2765
  6. 2766

    Optimizing Palm Oil Plantation Productivity Using Offline Blockchain and Drone Rover Solutions by Aryanto Aryanto, I Nengah Marccel Janara Brata Cipta, Dinda Armeylia Putri, Bella Amelia, Muhammad Herly Pratama

    Published 2024-12-01
    “…The increasing demand for sustainable palm oil production challenges plantations to maintain efficient management and data transparency, particularly in remote areas with limited internet access. This study aims to develop and implement an offline blockchain system integrated with drone rover devices to support data collection and decision-making without internet connectivity. …”
    Get full text
    Article
  7. 2767

    Dynamical Behaviors of Rumor Spreading Model with Control Measures by Xia-Xia Zhao, Jian-Zhong Wang

    Published 2014-01-01
    “…Besides that, monitoring the internet to prevent the spread of rumor is more important than deleting messages in media which already existed. …”
    Get full text
    Article
  8. 2768

    Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture by George V. Koutelakis, George K. Anastassopoulos, Dimitrios K. Lymberopoulos

    Published 2012-01-01
    “…Multiprotocol medical imaging communication through the Internet is more flexible than the tight DICOM transfers. …”
    Get full text
    Article
  9. 2769

    Big data security analysis method based on self-update threat intelligence database by Yanfang HOU, Jinhua WANG

    Published 2018-03-01
    “…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
    Get full text
    Article
  10. 2770

    FÜTÜRİSTİK BİR KAMUSAL ALAN ALTERNATİFİ OLARAK METAVERSE by Emre Savut

    Published 2023-03-01
    “…Yüzyılın sonlarında ortaya çıkan internet teknolojisi kamusal alan tartışmaları için yeni bir başlık açmıştır. …”
    Get full text
    Article
  11. 2771
  12. 2772

    AKADEMİK YAŞANTIDA SANAL TEHDİTLER VE VAKALAR ÜZERİNE BİR ANALİZ - AN ANALYSIS THROUGH CASES AND CYBER THREATS IN ACADEMIC LIFE by Yılmaz Gökşen, Muhammet Damar

    Published 2018-06-01
    “…Çalışma bubağlamda internet üzerinden gerçekleşen dolandırıcılık yöntemlerini kavramsalolarak ele almaktadır. …”
    Get full text
    Article
  13. 2773

    Information Spread of Emergency Events: Path Searching on Social Networks by Weihui Dai, Hongzhi Hu, Tunan Wu, Yonghui Dai

    Published 2014-01-01
    “…Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. …”
    Get full text
    Article
  14. 2774

    Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application by Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono

    Published 2022-01-01
    “…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
    Get full text
    Article
  15. 2775

    Intent-driven cloud-network convergence on-demand orchestration by Lulu ZHANG, Chungang YANG, Dong WANG, Ying OUYANG, Tong LI, Junjie GUO, Ru DONG

    Published 2022-10-01
    “…With the rapid development of cloud computing and Internet technology, user service demands show a diversified development trend, and cloud-network convergence has become an important choice for the development of the current information and communication industry.At present, cloud-network convergence only achieves simple cloud-network interconnection, which can not overcome the heavy problems of diversified service demands and massive heterogeneous resource supply.Therefore, promoting cloud-network convergence still requires strengthening the on-demand delivery capability of cloud services.Intent-driven network, as a new networking paradigm, becomes a viable option to solve this dilemma.The research status of cloud-network convergence was sorted out, and the research necessity of intention-driven cloud-network convergence business on-demand orchestration was summarized.Furthermore, the intent-driven cloud-network convergence architecture and its key technologies were proposed and analyzed, and on this basis, an on-demand orchestration model of cloud business was proposed.Finally, in the hybrid cloud interconnection and industrial Internet scenarios, the intent-driven on-demand orchestration model of cloud business was analyzed, and the future prospects were introduced.…”
    Get full text
    Article
  16. 2776

    Research on the Simulation Application of Data Mining in Urban Spatial Structure by Jun Zhang, Xin Sui, Xiong He

    Published 2020-01-01
    “…Data mining and simulation of the Internet of things (IOT) have been applied more and more widely in the rapidly developing urban research discipline. …”
    Get full text
    Article
  17. 2777

    Something old, something new: preliminary findings from an exploratory study about people's information habits and information grounds by Fisher Naumer, Durrance, Stromsky, Christianson

    Published 2005-01-01
    “…</b> People have information grounds from which the acquire information and the Internet is emerging as a popular information ground. …”
    Get full text
    Article
  18. 2778

    Leadership Networks as a Tool of Coercion in World Politics by A. I. Podberezkin, O. A. Podberezkina

    Published 2020-03-01
    “…Opinion leaders are increasingly participating in social media. The Internet is a reflection of the real world, it has the same laws as in real society. …”
    Get full text
    Article
  19. 2779

    BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems by Yashar Salami, Seyedreza Hosseini

    Published 2023-03-01
    “…The security of communication between Internet of Things devices is a big concern in this field, and with the increase in the number of devices and users, the current architecture and communication protocols cannot adequately respond to the system's needs, such as authentication and access authorization. …”
    Get full text
    Article
  20. 2780

    The Paradox of Cyber Warfare and Clausewitz’s Conception of War by Nageen Ashraf

    Published 2025-01-01
    “…Cyberspace is the virtual space created through the linkages of the internet and internet devices. Because of certain developments, cyberspace is now considered the fifth operational domain for warfare, with the other four domains being land, sea, air, and space. …”
    Get full text
    Article